Results

By type

          Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
ping: bad address 'onap-oof-has-etcd-0.oof-has-etcd'
Waiting for onap-oof-has-etcd-0.oof-has-etcd to come up
Skipping self-checking
Waiting for onap-oof-has-etcd-2.oof-has-etcd to come up
2021-10-09 23:26:01.823815 I | etcdmain: etcd Version: 3.2.24
2021-10-09 23:26:01.824025 I | etcdmain: Git SHA: 420a45226
2021-10-09 23:26:01.824032 I | etcdmain: Go Version: go1.8.7
2021-10-09 23:26:01.824039 I | etcdmain: Go OS/Arch: linux/amd64
2021-10-09 23:26:01.824045 I | etcdmain: setting maximum number of CPUs to 16, total number of available CPUs is 16
2021-10-09 23:26:01.824312 I | embed: listening for peers on http://0.0.0.0:2380
2021-10-09 23:26:01.824389 I | embed: listening for client requests on 0.0.0.0:2379
2021-10-09 23:26:01.839685 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.239:2380
2021-10-09 23:26:01.924221 I | pkg/netutil: resolving onap-oof-has-etcd-1.oof-has-etcd:2380 to 10.233.74.239:2380
2021-10-09 23:26:01.928866 I | etcdserver: name = onap-oof-has-etcd-1
2021-10-09 23:26:01.928881 I | etcdserver: data dir = /var/run/etcd/default.etcd
2021-10-09 23:26:01.928887 I | etcdserver: member dir = /var/run/etcd/default.etcd/member
2021-10-09 23:26:01.928891 I | etcdserver: heartbeat = 100ms
2021-10-09 23:26:01.928924 I | etcdserver: election = 1000ms
2021-10-09 23:26:01.928930 I | etcdserver: snapshot count = 100000
2021-10-09 23:26:01.928968 I | etcdserver: advertise client URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2379
2021-10-09 23:26:01.928974 I | etcdserver: initial advertise peer URLs = http://onap-oof-has-etcd-1.oof-has-etcd:2380
2021-10-09 23:26:01.928990 I | etcdserver: initial cluster = onap-oof-has-etcd-0=http://onap-oof-has-etcd-0.oof-has-etcd:2380,onap-oof-has-etcd-1=http://onap-oof-has-etcd-1.oof-has-etcd:2380,onap-oof-has-etcd-2=http://onap-oof-has-etcd-2.oof-has-etcd:2380
2021-10-09 23:26:01.943941 I | etcdserver: starting member 72b38cc930a2fa6f in cluster e8b03869cbf54258
2021-10-09 23:26:01.944028 I | raft: 72b38cc930a2fa6f became follower at term 0
2021-10-09 23:26:01.944043 I | raft: newRaft 72b38cc930a2fa6f [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]
2021-10-09 23:26:01.944055 I | raft: 72b38cc930a2fa6f became follower at term 1
2021-10-09 23:26:02.031203 W | auth: simple token is not cryptographically signed
2021-10-09 23:26:02.127053 I | rafthttp: starting peer 2d249ba41c7e44fa...
2021-10-09 23:26:02.127166 I | rafthttp: started HTTP pipelining with peer 2d249ba41c7e44fa
2021-10-09 23:26:02.128382 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-09 23:26:02.128549 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (writer)
2021-10-09 23:26:02.226793 I | rafthttp: started peer 2d249ba41c7e44fa
2021-10-09 23:26:02.226885 I | rafthttp: added peer 2d249ba41c7e44fa
2021-10-09 23:26:02.226905 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-09 23:26:02.227131 I | rafthttp: started streaming with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-09 23:26:02.227334 I | rafthttp: starting peer 8aae4c350a2413a5...
2021-10-09 23:26:02.227360 I | rafthttp: started HTTP pipelining with peer 8aae4c350a2413a5
2021-10-09 23:26:02.325869 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-09 23:26:02.326277 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (writer)
2021-10-09 23:26:02.423976 I | rafthttp: started peer 8aae4c350a2413a5
2021-10-09 23:26:02.424073 I | rafthttp: added peer 8aae4c350a2413a5
2021-10-09 23:26:02.424161 I | etcdserver: starting server... [version: 3.2.24, cluster version: to_be_decided]
2021-10-09 23:26:02.424218 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream MsgApp v2 reader)
2021-10-09 23:26:02.424337 I | rafthttp: started streaming with peer 8aae4c350a2413a5 (stream Message reader)
2021-10-09 23:26:02.425717 I | etcdserver/membership: added member 2d249ba41c7e44fa [http://onap-oof-has-etcd-2.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:02.425929 I | etcdserver/membership: added member 72b38cc930a2fa6f [http://onap-oof-has-etcd-1.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:02.426099 I | etcdserver/membership: added member 8aae4c350a2413a5 [http://onap-oof-has-etcd-0.oof-has-etcd:2380] to cluster e8b03869cbf54258
2021-10-09 23:26:03.724590 I | raft: 72b38cc930a2fa6f is starting a new election at term 1
2021-10-09 23:26:03.724694 I | raft: 72b38cc930a2fa6f became candidate at term 2
2021-10-09 23:26:03.724715 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 2
2021-10-09 23:26:03.724725 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 2
2021-10-09 23:26:03.724734 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 2
2021-10-09 23:26:04.925219 I | raft: 72b38cc930a2fa6f is starting a new election at term 2
2021-10-09 23:26:04.925290 I | raft: 72b38cc930a2fa6f became candidate at term 3
2021-10-09 23:26:04.925307 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 3
2021-10-09 23:26:04.925320 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 3
2021-10-09 23:26:04.925331 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 3
2021-10-09 23:26:06.058719 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-10-09 23:26:06.058772 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 reader)
2021-10-09 23:26:06.355733 E | rafthttp: failed to dial 2d249ba41c7e44fa on stream Message (peer 2d249ba41c7e44fa failed to find local node 72b38cc930a2fa6f)
2021-10-09 23:26:06.355759 I | rafthttp: peer 2d249ba41c7e44fa became inactive
2021-10-09 23:26:06.355785 I | rafthttp: peer 2d249ba41c7e44fa became active
2021-10-09 23:26:06.355803 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message writer)
2021-10-09 23:26:06.356142 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream MsgApp v2 writer)
2021-10-09 23:26:06.459512 I | rafthttp: established a TCP streaming connection with peer 2d249ba41c7e44fa (stream Message reader)
2021-10-09 23:26:06.524595 I | raft: 72b38cc930a2fa6f is starting a new election at term 3
2021-10-09 23:26:06.524655 I | raft: 72b38cc930a2fa6f became candidate at term 4
2021-10-09 23:26:06.524688 I | raft: 72b38cc930a2fa6f received MsgVoteResp from 72b38cc930a2fa6f at term 4
2021-10-09 23:26:06.524715 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 2d249ba41c7e44fa at term 4
2021-10-09 23:26:06.524727 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3] sent MsgVote request to 8aae4c350a2413a5 at term 4
2021-10-09 23:26:07.170667 I | raft: 72b38cc930a2fa6f [term: 4] received a MsgVote message with higher term from 2d249ba41c7e44fa [term: 271]
2021-10-09 23:26:07.170730 I | raft: 72b38cc930a2fa6f became follower at term 271
2021-10-09 23:26:07.170759 I | raft: 72b38cc930a2fa6f [logterm: 1, index: 3, vote: 0] cast MsgVote for 2d249ba41c7e44fa [logterm: 1, index: 3] at term 271
2021-10-09 23:26:07.174771 I | raft: raft.node: 72b38cc930a2fa6f elected leader 2d249ba41c7e44fa at term 271
2021-10-09 23:26:07.255082 I | etcdserver: published {Name:onap-oof-has-etcd-1 ClientURLs:[http://onap-oof-has-etcd-1.oof-has-etcd:2379]} to cluster e8b03869cbf54258
2021-10-09 23:26:07.255144 I | embed: ready to serve client requests
2021-10-09 23:26:07.255606 N | embed: serving insecure client requests on [::]:2379, this is strongly discouraged!
2021-10-09 23:26:07.524577 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:09.527161 N | auth: added a new user: root
2021-10-09 23:26:09.527350 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.003808004s) to execute
2021-10-09 23:26:09.527415 N | etcdserver/membership: set the initial cluster version to 3.0
2021-10-09 23:26:09.527482 I | etcdserver/api: enabled capabilities for version 3.0
2021-10-09 23:26:11.928198 N | auth: added a new user: conductor
2021-10-09 23:26:11.928293 W | etcdserver: request "header: auth_user_add:" with result "size:28" took too long (2.170727625s) to execute
2021-10-09 23:26:12.254817 N | auth: Role conductor is created
2021-10-09 23:26:12.454801 N | auth: role conductor's permission of key conductor is updated as READWRITE
2021-10-09 23:26:12.524907 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:12.557416 N | auth: granted role conductor to user conductor
2021-10-09 23:26:12.854608 N | auth: Role root is created
2021-10-09 23:26:12.859265 N | auth: granted role root to user root
2021-10-09 23:26:12.957382 N | auth: Authentication enabled
2021-10-09 23:26:17.525268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:22.525705 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:27.526041 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:32.526376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:37.526741 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:42.527144 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:47.527525 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:52.527783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:26:57.528033 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:02.528312 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:07.528681 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:12.529144 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:17.529390 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:22.529655 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:27.426033 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.994498696s) to execute
2021-10-09 23:27:27.529867 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:31.125620 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.602273689s) to execute
2021-10-09 23:27:32.569278 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:35.229065 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.994729573s) to execute
2021-10-09 23:27:37.623287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:40.123780 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.898916114s) to execute
2021-10-09 23:27:42.131408 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.003254753s) to execute
2021-10-09 23:27:42.131684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.005048724s) to execute
2021-10-09 23:27:42.623606 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:47.623897 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:48.523523 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.568501783s) to execute
2021-10-09 23:27:50.624205 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.000636495s) to execute
2021-10-09 23:27:52.624277 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:27:57.127230 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (4.202336252s) to execute
2021-10-09 23:27:57.723182 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:01.228017 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.80331696s) to execute
2021-10-09 23:28:02.723573 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:03.125206 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.700428249s) to execute
2021-10-09 23:28:05.130045 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.001531142s) to execute
proto: no coders for int
proto: no encoder for ValueSize int [GetProperties]
2021-10-09 23:28:07.327481 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (4.071716698s) to execute
2021-10-09 23:28:07.723977 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:09.524307 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:14" took too long (2.066626449s) to execute
2021-10-09 23:28:12.724373 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:13.227436 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (3.502498424s) to execute
2021-10-09 23:28:15.328049 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (2.004643859s) to execute
2021-10-09 23:28:17.430602 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.906914795s) to execute
2021-10-09 23:28:17.555237 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (121.320502ms) to execute
2021-10-09 23:28:17.724646 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:21.625687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (3.470979345s) to execute
2021-10-09 23:28:22.724999 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:27.424654 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.669733091s) to execute
2021-10-09 23:28:27.725360 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:27.755329 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (195.455391ms) to execute
2021-10-09 23:28:29.426758 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (703.22117ms) to execute
2021-10-09 23:28:32.725673 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:33.429687 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.605992384s) to execute
2021-10-09 23:28:37.823287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:39.428300 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (5.904738135s) to execute
2021-10-09 23:28:39.555863 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (124.816915ms) to execute
2021-10-09 23:28:39.557497 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:364" took too long (126.156182ms) to execute
2021-10-09 23:28:42.823660 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:44.624580 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.370040852s) to execute
2021-10-09 23:28:47.724053 W | etcdserver: request "header: authenticate:" with result "size:49" took too long (1.469385009s) to execute
2021-10-09 23:28:47.824068 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:49.723800 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (868.297205ms) to execute
2021-10-09 23:28:52.727405 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.569719ms) to execute
2021-10-09 23:28:52.824433 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:54.730310 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.9037004s) to execute
2021-10-09 23:28:57.824674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:28:58.423991 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700689283s) to execute
2021-10-09 23:29:00.524529 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.969982074s) to execute
2021-10-09 23:29:00.524709 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.00031198s) to execute
2021-10-09 23:29:02.824941 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:02.856685 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.501706ms) to execute
2021-10-09 23:29:07.825281 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:12.825594 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:17.825848 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:18.425976 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602660709s) to execute
2021-10-09 23:29:22.823608 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.26881629s) to execute
2021-10-09 23:29:22.826091 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:24.630495 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.707135095s) to execute
2021-10-09 23:29:24.630676 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.804393837s) to execute
2021-10-09 23:29:26.623577 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.69996819s) to execute
2021-10-09 23:29:26.623798 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.895369452s) to execute
2021-10-09 23:29:26.623886 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.90051894s) to execute
2021-10-09 23:29:26.726628 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.11234ms) to execute
2021-10-09 23:29:27.826585 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:28.527491 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.798708916s) to execute
2021-10-09 23:29:30.523703 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.268785593s) to execute
2021-10-09 23:29:30.755205 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (126.52363ms) to execute
2021-10-09 23:29:32.826793 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:37.827167 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:42.827414 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:47.827810 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:49.027756 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.604442248s) to execute
2021-10-09 23:29:49.355116 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (196.055429ms) to execute
2021-10-09 23:29:52.828065 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:54.930788 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.873722473s) to execute
2021-10-09 23:29:57.828368 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:29:59.126146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.102624801s) to execute
2021-10-09 23:29:59.126444 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.193347823s) to execute
2021-10-09 23:29:59.126696 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.19321232s) to execute
2021-10-09 23:30:00.925255 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.695481126s) to execute
2021-10-09 23:30:02.923150 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:04.826987 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.703676574s) to execute
2021-10-09 23:30:04.931826 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (102.395971ms) to execute
2021-10-09 23:30:06.826743 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.071376097s) to execute
2021-10-09 23:30:07.923453 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:12.032144 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.408633841s) to execute
2021-10-09 23:30:12.223668 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (188.321976ms) to execute
2021-10-09 23:30:13.023380 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:18.023665 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:18.969152 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.94587641s) to execute
2021-10-09 23:30:19.156342 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (132.949914ms) to execute
2021-10-09 23:30:19.158419 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (135.014979ms) to execute
2021-10-09 23:30:23.024156 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:24.623328 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.668454975s) to execute
2021-10-09 23:30:26.924069 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.297566074s) to execute
2021-10-09 23:30:28.024427 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:28.730509 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.104802921s) to execute
2021-10-09 23:30:28.730591 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.104867567s) to execute
2021-10-09 23:30:28.730704 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802600328s) to execute
2021-10-09 23:30:28.730838 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.803733744s) to execute
2021-10-09 23:30:33.024607 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:34.924598 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.0994491s) to execute
2021-10-09 23:30:35.055511 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.376727ms) to execute
2021-10-09 23:30:35.056891 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.24537ms) to execute
2021-10-09 23:30:35.254887 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (197.187456ms) to execute
2021-10-09 23:30:37.123653 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.568868429s) to execute
2021-10-09 23:30:38.024844 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:41.030081 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (274.885943ms) to execute
2021-10-09 23:30:43.025044 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:44.832072 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.797967573s) to execute
2021-10-09 23:30:45.057573 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.703458ms) to execute
2021-10-09 23:30:45.155111 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (229.105403ms) to execute
2021-10-09 23:30:45.356611 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (296.798511ms) to execute
2021-10-09 23:30:48.025323 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:49.327186 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.572372737s) to execute
2021-10-09 23:30:53.025629 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:53.227706 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.422228ms) to execute
2021-10-09 23:30:55.326250 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971281132s) to execute
2021-10-09 23:30:57.427496 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.304140227s) to execute
2021-10-09 23:30:58.026014 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:30:59.528378 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.902277424s) to execute
2021-10-09 23:30:59.654934 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (123.795506ms) to execute
2021-10-09 23:31:02.631542 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.408236935s) to execute
2021-10-09 23:31:03.026282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:08.026489 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:13.026751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:13.127330 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (772.468334ms) to execute
2021-10-09 23:31:16.231117 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.576025319s) to execute
2021-10-09 23:31:18.123195 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:20.125400 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.799887678s) to execute
2021-10-09 23:31:22.125175 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.997542761s) to execute
2021-10-09 23:31:22.125371 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.67024219s) to execute
2021-10-09 23:31:22.126662 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.998305147s) to execute
2021-10-09 23:31:22.355257 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (226.194775ms) to execute
2021-10-09 23:31:23.123482 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:24.132090 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.377319714s) to execute
2021-10-09 23:31:24.455083 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (195.392225ms) to execute
2021-10-09 23:31:28.123802 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:28.326347 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (201.74194ms) to execute
2021-10-09 23:31:33.123757 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.16863015s) to execute
2021-10-09 23:31:33.124027 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:34.923885 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600134007s) to execute
2021-10-09 23:31:38.124294 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:39.127088 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.90374574s) to execute
2021-10-09 23:31:39.127518 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.904047321s) to execute
2021-10-09 23:31:41.226689 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096469176s) to execute
2021-10-09 23:31:41.226877 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.09700275s) to execute
2021-10-09 23:31:43.124584 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:43.331867 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.105046429s) to execute
2021-10-09 23:31:43.332222 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.005685426s) to execute
2021-10-09 23:31:45.526083 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.101298741s) to execute
2021-10-09 23:31:47.623577 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.20023797s) to execute
2021-10-09 23:31:47.623674 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.09335773s) to execute
2021-10-09 23:31:47.623844 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000350532s) to execute
2021-10-09 23:31:47.755133 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.362701ms) to execute
2021-10-09 23:31:48.124960 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:51.423369 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.69993621s) to execute
2021-10-09 23:31:51.554862 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.934917ms) to execute
2021-10-09 23:31:53.125221 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:31:55.626146 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.171383743s) to execute
2021-10-09 23:31:58.125409 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:00.129564 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.706138077s) to execute
2021-10-09 23:32:02.428389 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20231118s) to execute
2021-10-09 23:32:03.125730 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:04.523452 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.391327089s) to execute
2021-10-09 23:32:04.523773 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900292711s) to execute
2021-10-09 23:32:04.523940 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.997920025s) to execute
2021-10-09 23:32:04.656275 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.461057ms) to execute
2021-10-09 23:32:08.126091 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:08.928541 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.003729352s) to execute
2021-10-09 23:32:10.725658 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (670.98815ms) to execute
2021-10-09 23:32:13.126348 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:14.926820 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701508863s) to execute
2021-10-09 23:32:15.155348 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (127.265146ms) to execute
2021-10-09 23:32:18.126635 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:21.523560 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.300198999s) to execute
2021-10-09 23:32:21.654884 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.193155ms) to execute
2021-10-09 23:32:21.655101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.227586ms) to execute
2021-10-09 23:32:21.954735 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (297.467374ms) to execute
2021-10-09 23:32:23.126904 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:25.723393 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.668703066s) to execute
2021-10-09 23:32:25.854537 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.466889ms) to execute
2021-10-09 23:32:28.023255 I | auth: deleting token ddZYAnnfeUCwesly.17 for user conductor
2021-10-09 23:32:28.023340 I | auth: deleting token ERtsgETiCKOdNyIl.18 for user conductor
2021-10-09 23:32:28.127168 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:30.023478 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.968433225s) to execute
2021-10-09 23:32:31.957795 I | auth: deleting token mteorbKZMBAOfJqv.22 for user conductor
2021-10-09 23:32:31.957915 I | auth: deleting token VSfJQBFIfUtnhDAm.21 for user conductor
2021-10-09 23:32:33.127403 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:32:35.957894 I | auth: deleting token jQwmXFnLoaMatERO.26 for user conductor
2021-10-09 23:32:35.957969 I | auth: deleting token zAbhhDmuCTXhrBlF.25 for user conductor
2021-10-09 23:32:37.424315 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.20092592s) to execute
2021-10-09 23:32:38.127670 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:41.423862 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.868870024s) to execute
2021-10-09 23:32:41.424181 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.997064623s) to execute
2021-10-09 23:32:41.554931 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.17966ms) to execute
2021-10-09 23:32:41.623415 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (196.761873ms) to execute
2021-10-09 23:32:41.724765 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (101.324819ms) to execute
2021-10-09 23:32:43.023197 I | auth: deleting token vOPOKZPGeGUSDQWc.28 for user conductor
2021-10-09 23:32:43.023240 I | auth: deleting token dzaFJzUKWitDbTfn.30 for user conductor
2021-10-09 23:32:43.023247 I | auth: deleting token avZYQatzdICvUfyY.29 for user conductor
2021-10-09 23:32:43.128078 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:43.726782 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (462.552718ms) to execute
2021-10-09 23:32:48.128351 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:48.129718 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.40639023s) to execute
2021-10-09 23:32:48.957803 I | auth: deleting token dRdVLNkEhzWjLRqx.32 for user conductor
2021-10-09 23:32:48.957868 I | auth: deleting token MjuSpwFZCrWlcJXT.36 for user conductor
2021-10-09 23:32:48.957881 I | auth: deleting token PGGwmfippUOBqJGU.35 for user conductor
2021-10-09 23:32:48.957890 I | auth: deleting token MOxoAcOWsqlMXMeb.34 for user conductor
2021-10-09 23:32:50.957857 I | auth: deleting token kGwWtOVjtwLLuvJa.38 for user conductor
2021-10-09 23:32:50.957897 I | auth: deleting token qNUWoCDpEqHjqGiM.41 for user conductor
2021-10-09 23:32:53.223214 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:54.726762 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.969141085s) to execute
2021-10-09 23:32:57.957777 I | auth: deleting token fdpykUXqDvjyFhiQ.44 for user conductor
2021-10-09 23:32:57.957840 I | auth: deleting token OITpUywDpMmigJqt.45 for user conductor
2021-10-09 23:32:57.957852 I | auth: deleting token XotxhrMMFXhlfdbV.50 for user conductor
2021-10-09 23:32:57.957866 I | auth: deleting token IiTYUYOIsGEfEaeE.46 for user conductor
2021-10-09 23:32:57.957879 I | auth: deleting token qgDGlPwlvmFArbIn.43 for user conductor
2021-10-09 23:32:58.223535 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:32:59.126690 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.271767051s) to execute
2021-10-09 23:33:01.226652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971941601s) to execute
2021-10-09 23:33:02.023157 I | auth: deleting token EQzcmxhSzwvYiBgQ.52 for user conductor
2021-10-09 23:33:02.023201 I | auth: deleting token lyrZOnxjUrsvAyAg.51 for user conductor
2021-10-09 23:33:03.223813 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:03.227670 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.004295582s) to execute
2021-10-09 23:33:03.227817 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.004220351s) to execute
2021-10-09 23:33:03.227878 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.998465449s) to execute
2021-10-09 23:33:03.228019 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.804581149s) to execute
2021-10-09 23:33:03.355058 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (124.289689ms) to execute
2021-10-09 23:33:03.424860 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (101.28792ms) to execute
2021-10-09 23:33:03.957795 I | auth: deleting token CXWqyUPLbDxsdqqU.54 for user conductor
2021-10-09 23:33:03.957859 I | auth: deleting token EZMvHVktjgLXBXVa.56 for user conductor
2021-10-09 23:33:03.957873 I | auth: deleting token DbNqKWeyysMpqiTQ.58 for user conductor
2021-10-09 23:33:08.023119 I | auth: deleting token jxIXUfEGuAfFBDVn.61 for user conductor
2021-10-09 23:33:08.023179 I | auth: deleting token kBECGSMKEHOQtpvI.60 for user conductor
2021-10-09 23:33:08.224173 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:09.627769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.001453781s) to execute
2021-10-09 23:33:09.957721 I | auth: deleting token SBVBSvrmamukaUPX.65 for user conductor
2021-10-09 23:33:09.957758 I | auth: deleting token anDYGnkQweTobnTb.64 for user conductor
2021-10-09 23:33:11.529582 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.606240144s) to execute
2021-10-09 23:33:11.623314 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.89998396s) to execute
2021-10-09 23:33:11.755178 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.031498595s) to execute
2021-10-09 23:33:11.757542 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (131.618737ms) to execute
2021-10-09 23:33:11.757591 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.678981ms) to execute
2021-10-09 23:33:13.224400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:13.957739 I | auth: deleting token QJZGggxCghGaVZVn.68 for user conductor
2021-10-09 23:33:13.957794 I | auth: deleting token LVQXIfcjlnByxfRK.67 for user conductor
2021-10-09 23:33:15.930350 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.004109335s) to execute
2021-10-09 23:33:15.957812 I | auth: deleting token EDuivzyAMiUkFxLg.69 for user conductor
2021-10-09 23:33:16.256222 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.775251ms) to execute
2021-10-09 23:33:17.957725 I | auth: deleting token MCtKLVyrAMDKSAgQ.73 for user conductor
2021-10-09 23:33:17.957772 I | auth: deleting token FbWfDbyyzJqxViGM.71 for user conductor
2021-10-09 23:33:18.224688 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:22.023021 I | auth: deleting token RzcYxfHQgcjaHiaw.76 for user conductor
2021-10-09 23:33:22.023068 I | auth: deleting token krkcymcdQmhFiaQm.75 for user conductor
2021-10-09 23:33:22.023078 I | auth: deleting token FnfjXAviZGBudHWA.79 for user conductor
2021-10-09 23:33:22.023083 I | auth: deleting token vUOdIyOprbiJZmHj.74 for user conductor
2021-10-09 23:33:22.823526 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (367.243336ms) to execute
2021-10-09 23:33:23.224947 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:24.023189 I | auth: deleting token pzyXOJlkPviaNhGW.80 for user conductor
2021-10-09 23:33:26.624992 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.001713697s) to execute
2021-10-09 23:33:26.754823 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.996ms) to execute
2021-10-09 23:33:27.957740 I | auth: deleting token UUDjwViTdsindQdo.82 for user conductor
2021-10-09 23:33:27.957792 I | auth: deleting token ObwutKgUlZameBKM.81 for user conductor
2021-10-09 23:33:28.323273 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:29.957769 I | auth: deleting token vCwovPorFTFjqBqg.85 for user conductor
2021-10-09 23:33:29.957855 I | auth: deleting token IjMDHFirYjPTgilB.83 for user conductor
2021-10-09 23:33:30.527594 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.76966432s) to execute
2021-10-09 23:33:31.957796 I | auth: deleting token fGtoiEPnsztEhqRy.86 for user conductor
2021-10-09 23:33:33.024769 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10116276s) to execute
2021-10-09 23:33:33.323630 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:33.957759 I | auth: deleting token PaFOoLvsItGrBUrq.87 for user conductor
2021-10-09 23:33:35.124737 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.06816993s) to execute
2021-10-09 23:33:37.330233 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.203318746s) to execute
2021-10-09 23:33:37.330372 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.105378037s) to execute
2021-10-09 23:33:38.324282 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:39.923549 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (165.230455ms) to execute
2021-10-09 23:33:39.957716 I | auth: deleting token TfjSnFamxFauxEdw.93 for user conductor
2021-10-09 23:33:39.957793 I | auth: deleting token zCBdkSrhTlzMpMcb.92 for user conductor
2021-10-09 23:33:39.957814 I | auth: deleting token UVzWdJPHpksKwdAW.90 for user conductor
2021-10-09 23:33:39.957834 I | auth: deleting token WjLlTUfMVaKectaG.91 for user conductor
2021-10-09 23:33:39.957848 I | auth: deleting token lGdHaULmtyMREqpI.89 for user conductor
2021-10-09 23:33:39.957859 I | auth: deleting token nyCSZmQcxUfivgdF.88 for user conductor
2021-10-09 23:33:40.957799 I | auth: deleting token jeYONVbNtKaNIPnQ.95 for user conductor
2021-10-09 23:33:42.228199 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.565724302s) to execute
2021-10-09 23:33:42.957713 I | auth: deleting token nMmnksRNmBnRNLfh.96 for user conductor
2021-10-09 23:33:43.324683 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:44.331855 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.276784089s) to execute
2021-10-09 23:33:44.957768 I | auth: deleting token OWyZVpQcuzLWRjRN.97 for user conductor
2021-10-09 23:33:44.957875 I | auth: deleting token zVQUMXatiXDCbUvz.98 for user conductor
2021-10-09 23:33:48.023185 I | auth: deleting token pEddgkmcgxcRFLcf.100 for user conductor
2021-10-09 23:33:48.023223 I | auth: deleting token GQSfhRVKramPquoi.99 for user conductor
2021-10-09 23:33:48.324966 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:50.023183 I | auth: deleting token RrVWGLasyLhECiOe.101 for user conductor
2021-10-09 23:33:50.023261 I | auth: deleting token SDiUnSrTdiUUlSAq.102 for user conductor
2021-10-09 23:33:52.429553 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.900698221s) to execute
2021-10-09 23:33:53.023189 I | auth: deleting token ltIrVMqdpVtThfMv.103 for user conductor
2021-10-09 23:33:53.423165 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:54.957767 I | auth: deleting token dccqQnJIYaiIXBui.105 for user conductor
2021-10-09 23:33:54.957848 I | auth: deleting token hVlPpgVVSzzHslaK.106 for user conductor
2021-10-09 23:33:54.957869 I | auth: deleting token xgjOwqwMZleBkcab.104 for user conductor
2021-10-09 23:33:56.427105 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.872141786s) to execute
2021-10-09 23:33:56.555736 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.136017ms) to execute
2021-10-09 23:33:56.654711 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (224.827481ms) to execute
2021-10-09 23:33:56.654800 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (224.751806ms) to execute
2021-10-09 23:33:58.423486 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:33:58.957834 I | auth: deleting token ILVGPJVwDklerScT.108 for user conductor
2021-10-09 23:33:59.223422 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (899.6327ms) to execute
2021-10-09 23:34:01.023124 I | auth: deleting token RgwYqapRlVFhdcEV.111 for user conductor
2021-10-09 23:34:01.023198 I | auth: deleting token JSztegzBQZGCxppS.110 for user conductor
2021-10-09 23:34:01.023213 I | auth: deleting token OVKkimfxTtcTikKI.107 for user conductor
2021-10-09 23:34:01.630184 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (806.873518ms) to execute
2021-10-09 23:34:02.957814 I | auth: deleting token AJrTXnWjVeZbEyTw.112 for user conductor
2021-10-09 23:34:02.957880 I | auth: deleting token oHufSCbKrMzKOItC.113 for user conductor
2021-10-09 23:34:03.423918 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:04.023167 I | auth: deleting token tHdaSPsmcGhijwdQ.115 for user conductor
2021-10-09 23:34:05.957784 I | auth: deleting token IlqBzTpTcxaNaber.116 for user conductor
2021-10-09 23:34:08.323465 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.368886902s) to execute
2021-10-09 23:34:08.523412 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:09.023238 I | auth: deleting token XBBoQVfLbUpTFxcF.117 for user conductor
2021-10-09 23:34:11.957840 I | auth: deleting token IqVgMCCHkftzXtcw.118 for user conductor
2021-10-09 23:34:13.523830 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:14.957770 I | auth: deleting token USknqNxqBFfYNzDj.119 for user conductor
2021-10-09 23:34:15.025195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.570507104s) to execute
2021-10-09 23:34:15.025387 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (6.698201791s) to execute
2021-10-09 23:34:17.229486 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.099484957s) to execute
2021-10-09 23:34:18.524143 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:18.957844 I | auth: deleting token wPGvMuFRUoWptYng.120 for user conductor
2021-10-09 23:34:19.527673 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.104166051s) to execute
2021-10-09 23:34:21.228821 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.698094722s) to execute
2021-10-09 23:34:21.229196 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.604470257s) to execute
2021-10-09 23:34:22.957828 I | auth: deleting token pvGzrTKLvYHiFDUK.124 for user conductor
2021-10-09 23:34:22.957887 I | auth: deleting token gVKxPoIqLkkRLeMJ.122 for user conductor
2021-10-09 23:34:23.330339 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.906804873s) to execute
2021-10-09 23:34:23.524440 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:24.957780 I | auth: deleting token olQiFNtnDGycRvqB.123 for user conductor
2021-10-09 23:34:24.957839 I | auth: deleting token maqxNCBGcowwXzSp.121 for user conductor
2021-10-09 23:34:25.424445 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.900983193s) to execute
2021-10-09 23:34:25.424709 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.001343175s) to execute
2021-10-09 23:34:26.957733 I | auth: deleting token RdCbiqIXZXhrEJvN.125 for user conductor
2021-10-09 23:34:26.957785 I | auth: deleting token YzHukhZfGaDdOMyi.126 for user conductor
2021-10-09 23:34:26.957802 I | auth: deleting token jfePzcKTJTtKanOI.127 for user conductor
2021-10-09 23:34:27.626945 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.199394787s) to execute
2021-10-09 23:34:27.627290 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.179961885s) to execute
2021-10-09 23:34:27.627454 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (504.021915ms) to execute
2021-10-09 23:34:28.524703 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:30.957757 I | auth: deleting token QxEyHwofWsAxEloE.129 for user conductor
2021-10-09 23:34:30.957836 I | auth: deleting token nPAGkDjjKSlZzrAN.131 for user conductor
2021-10-09 23:34:30.957848 I | auth: deleting token VxIiexsRtdbOSTPr.130 for user conductor
2021-10-09 23:34:30.957860 I | auth: deleting token CzyfPNwlCAQWUJRV.128 for user conductor
2021-10-09 23:34:31.730877 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.974133206s) to execute
2021-10-09 23:34:31.731285 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.904364514s) to execute
2021-10-09 23:34:32.957789 I | auth: deleting token YChOqQTQSWfQDZKR.132 for user conductor
2021-10-09 23:34:33.525109 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:33.957799 I | auth: deleting token TjrTgeOLRabEXcxH.133 for user conductor
2021-10-09 23:34:35.957715 I | auth: deleting token lYpVulROBZWuAMWF.134 for user conductor
2021-10-09 23:34:36.425491 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.002041882s) to execute
2021-10-09 23:34:38.525346 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:38.826158 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.970981031s) to execute
2021-10-09 23:34:38.957677 I | auth: deleting token DBAZFXwEtNDsQgbR.135 for user conductor
2021-10-09 23:34:40.827164 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.203778081s) to execute
2021-10-09 23:34:41.023164 I | auth: deleting token UEKdPAyRrweVkbzU.136 for user conductor
2021-10-09 23:34:42.923670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.091726186s) to execute
2021-10-09 23:34:43.525587 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:46.527908 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.466837175s) to execute
2021-10-09 23:34:46.569730 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.546321563s) to execute
2021-10-09 23:34:48.525772 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:48.724842 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.129013214s) to execute
2021-10-09 23:34:48.725091 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.137795396s) to execute
2021-10-09 23:34:48.855042 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.229512853s) to execute
2021-10-09 23:34:48.857162 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.705362ms) to execute
2021-10-09 23:34:49.957741 I | auth: deleting token mkksBZOEwtsLLitt.137 for user conductor
2021-10-09 23:34:49.957796 I | auth: deleting token MBJvTahPvLuzNsdt.144 for user conductor
2021-10-09 23:34:49.957810 I | auth: deleting token mbrqXvCmYCtiIkkw.138 for user conductor
2021-10-09 23:34:49.957821 I | auth: deleting token uPuIOPzNxsMyPNbh.143 for user conductor
2021-10-09 23:34:49.957832 I | auth: deleting token HfbTPoWvyrGdpHZk.139 for user conductor
2021-10-09 23:34:49.957842 I | auth: deleting token LlkldPKibQtOJBjR.142 for user conductor
2021-10-09 23:34:49.957864 I | auth: deleting token QtvXJGKJkmLUhPQz.140 for user conductor
2021-10-09 23:34:50.725787 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.002426581s) to execute
2021-10-09 23:34:53.526035 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:55.023290 I | auth: deleting token gaWwsdXfpcBsBzmh.149 for user conductor
2021-10-09 23:34:55.023347 I | auth: deleting token jsIuGmXsXGwgZGpp.146 for user conductor
2021-10-09 23:34:55.254673 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.984182ms) to execute
2021-10-09 23:34:57.529698 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706324223s) to execute
2021-10-09 23:34:58.526328 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:34:59.957815 I | auth: deleting token MpupczwddYaDDWLT.148 for user conductor
2021-10-09 23:34:59.957879 I | auth: deleting token aXmgyqjReeTnEAGK.145 for user conductor
2021-10-09 23:34:59.957891 I | auth: deleting token viwUcLUimlfALQjE.151 for user conductor
2021-10-09 23:34:59.957904 I | auth: deleting token gQXrlJlTDeAqhWQv.152 for user conductor
2021-10-09 23:34:59.957917 I | auth: deleting token hZgsPCRYpMzhTlvU.150 for user conductor
2021-10-09 23:35:02.024860 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.501598178s) to execute
2021-10-09 23:35:03.526554 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:04.026917 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.80359718s) to execute
2021-10-09 23:35:04.027070 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903559592s) to execute
2021-10-09 23:35:04.254708 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.143768ms) to execute
2021-10-09 23:35:04.957758 I | auth: deleting token NGgxjvRawHyqTiMC.156 for user conductor
2021-10-09 23:35:04.957811 I | auth: deleting token JFHPamoxwbHUeCxe.154 for user conductor
2021-10-09 23:35:04.957823 I | auth: deleting token SvsKlfBOivXbsPny.153 for user conductor
2021-10-09 23:35:04.957834 I | auth: deleting token QoRhQQsoBumoPSam.155 for user conductor
2021-10-09 23:35:06.527518 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.304061363s) to execute
2021-10-09 23:35:06.957905 I | auth: deleting token UPVlSLmwKTRvWxcl.157 for user conductor
2021-10-09 23:35:07.957763 I | auth: deleting token adhcbnDwkKEIZuvw.158 for user conductor
2021-10-09 23:35:08.526895 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:08.629022 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.174296539s) to execute
2021-10-09 23:35:08.957800 I | auth: deleting token nirSsDkGaoUGBtMR.159 for user conductor
2021-10-09 23:35:12.957767 I | auth: deleting token vDUZDLqueDfjafmN.160 for user conductor
2021-10-09 23:35:12.957842 I | auth: deleting token ftcpQbDSnDULHPZz.162 for user conductor
2021-10-09 23:35:12.957857 I | auth: deleting token DqLAqcRVfTpsbWOd.161 for user conductor
2021-10-09 23:35:13.527407 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:15.024078 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.294179559s) to execute
2021-10-09 23:35:15.024238 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (6.391966194s) to execute
2021-10-09 23:35:18.527773 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:19.424770 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.901381885s) to execute
2021-10-09 23:35:19.555140 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.682063ms) to execute
2021-10-09 23:35:19.957806 I | auth: deleting token LToXfMJedBmRTcDp.164 for user conductor
2021-10-09 23:35:19.957863 I | auth: deleting token cJfcKWojmqwApHCf.165 for user conductor
2021-10-09 23:35:19.957877 I | auth: deleting token nKETNtywWEvUssWH.166 for user conductor
2021-10-09 23:35:19.957893 I | auth: deleting token fyQwlorwtMMObCSy.163 for user conductor
2021-10-09 23:35:19.957905 I | auth: deleting token cBHOkDyxoydZoFpG.167 for user conductor
2021-10-09 23:35:21.929007 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.405710958s) to execute
2021-10-09 23:35:23.528124 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:24.226847 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.07108394s) to execute
2021-10-09 23:35:24.555263 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.780896ms) to execute
2021-10-09 23:35:24.957740 I | auth: deleting token FUrcOQGOojQZCaKH.168 for user conductor
2021-10-09 23:35:26.755101 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (194.903822ms) to execute
2021-10-09 23:35:26.957779 I | auth: deleting token HeXkqijVdMzJfcVe.169 for user conductor
2021-10-09 23:35:26.957841 I | auth: deleting token UzQEmPfKeeeVZEzo.170 for user conductor
2021-10-09 23:35:28.528400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:28.957688 I | auth: deleting token vUCEmwBYwOPNAEMU.172 for user conductor
2021-10-09 23:35:28.957731 I | auth: deleting token dxLjvUtgklkcFExw.171 for user conductor
2021-10-09 23:35:28.957741 I | auth: deleting token NaUfEHRsPHtqghBe.173 for user conductor
2021-10-09 23:35:33.528751 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:34.957846 I | auth: deleting token jibvQjouCNDnUThE.175 for user conductor
2021-10-09 23:35:35.957811 I | auth: deleting token MKPlPsWkXzifTgIV.176 for user conductor
2021-10-09 23:35:35.957875 I | auth: deleting token gSibOJfZtYygOTcf.174 for user conductor
2021-10-09 23:35:35.957888 I | auth: deleting token UUHuNoxcjcdLQmYL.177 for user conductor
2021-10-09 23:35:38.023670 I | auth: deleting token aaKjKikNDlSOJtMB.178 for user conductor
2021-10-09 23:35:38.023723 I | auth: deleting token NnuYZXsXKOEHwKdH.179 for user conductor
2021-10-09 23:35:38.023742 I | auth: deleting token pDfiLMmHVkKfmWph.180 for user conductor
2021-10-09 23:35:38.330928 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.076084118s) to execute
2021-10-09 23:35:38.528971 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:40.426236 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971246022s) to execute
2021-10-09 23:35:41.957794 I | auth: deleting token jMfNNpzeGlqEvbIX.181 for user conductor
2021-10-09 23:35:43.623415 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:44.525993 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.901193886s) to execute
2021-10-09 23:35:44.957964 I | auth: deleting token KoVzpAxTJJAsoxVh.184 for user conductor
2021-10-09 23:35:45.957779 I | auth: deleting token CEJwuOMTvKeaxTaf.185 for user conductor
2021-10-09 23:35:45.957819 I | auth: deleting token GxyNOpFzlGyMOVOv.183 for user conductor
2021-10-09 23:35:45.957828 I | auth: deleting token YdxwobnDMGvwwWom.182 for user conductor
2021-10-09 23:35:46.624258 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.96936079s) to execute
2021-10-09 23:35:46.624502 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.001191473s) to execute
2021-10-09 23:35:46.657520 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.034124758s) to execute
2021-10-09 23:35:46.756258 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.534762ms) to execute
2021-10-09 23:35:46.854629 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.226284ms) to execute
2021-10-09 23:35:48.023263 I | auth: deleting token lNnQzjGJKniNpXtJ.186 for user conductor
2021-10-09 23:35:48.624409 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:49.957793 I | auth: deleting token fnnekoJWrTcspASJ.187 for user conductor
2021-10-09 23:35:49.957860 I | auth: deleting token DMsEpNNeAntrIoVh.188 for user conductor
2021-10-09 23:35:50.926719 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.571880091s) to execute
2021-10-09 23:35:51.023190 I | auth: deleting token RsFJroQDEVrsOKew.189 for user conductor
2021-10-09 23:35:53.224877 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.098723806s) to execute
2021-10-09 23:35:53.225018 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.870036162s) to execute
2021-10-09 23:35:53.624630 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:53.654801 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (291.026183ms) to execute
2021-10-09 23:35:53.957780 I | auth: deleting token vytNKCQVZLSmiwjn.190 for user conductor
2021-10-09 23:35:55.957814 I | auth: deleting token faeZrpuzpfDgzfvx.192 for user conductor
2021-10-09 23:35:55.957868 I | auth: deleting token BPQFMtCsMfekGEIG.191 for user conductor
2021-10-09 23:35:57.957753 I | auth: deleting token eJQGRFMFFFhZQnjv.193 for user conductor
2021-10-09 23:35:58.624995 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:35:59.957766 I | auth: deleting token AVcNzwPFJhuUaYrG.194 for user conductor
2021-10-09 23:35:59.957835 I | auth: deleting token CBwWQZvFzJPgQWVj.196 for user conductor
2021-10-09 23:35:59.957847 I | auth: deleting token rYqDyGETZRXtNYkq.195 for user conductor
2021-10-09 23:36:02.957694 I | auth: deleting token xeJQQyzCvetITowG.197 for user conductor
2021-10-09 23:36:02.957759 I | auth: deleting token UZbTpKWHZrgNEaSi.198 for user conductor
2021-10-09 23:36:03.028297 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.17353733s) to execute
2021-10-09 23:36:03.625245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:04.957752 I | auth: deleting token VUfJXKZIJutLKgzR.199 for user conductor
2021-10-09 23:36:05.229398 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.172734896s) to execute
2021-10-09 23:36:05.229543 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.197811624s) to execute
2021-10-09 23:36:06.957815 I | auth: deleting token kOmZUrZFBqNOdMJE.200 for user conductor
2021-10-09 23:36:07.923835 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.565209345s) to execute
2021-10-09 23:36:08.629411 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:09.957807 I | auth: deleting token IHeqSapNrfDudosN.201 for user conductor
2021-10-09 23:36:10.027589 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.372931343s) to execute
2021-10-09 23:36:13.629767 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:13.957812 I | auth: deleting token JykDKngzYrHuHbbQ.203 for user conductor
2021-10-09 23:36:13.957885 I | auth: deleting token arASXrDytRwcFVLE.202 for user conductor
2021-10-09 23:36:14.525926 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.302694238s) to execute
2021-10-09 23:36:14.526281 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.40268334s) to execute
2021-10-09 23:36:16.230166 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.606713787s) to execute
2021-10-09 23:36:16.230555 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.701182886s) to execute
2021-10-09 23:36:16.230716 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.702383254s) to execute
2021-10-09 23:36:17.023144 I | auth: deleting token ZvKAnysYpTFwvwwy.205 for user conductor
2021-10-09 23:36:18.723257 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:18.924650 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.499266707s) to execute
2021-10-09 23:36:18.924776 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.601212409s) to execute
2021-10-09 23:36:20.930573 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.807108879s) to execute
2021-10-09 23:36:20.957802 I | auth: deleting token ITYoKqjJesxxAdBY.207 for user conductor
2021-10-09 23:36:20.957847 I | auth: deleting token fIPzdSYytyhMFmXr.208 for user conductor
2021-10-09 23:36:20.957857 I | auth: deleting token ZygYHzoKqvSwdJoX.209 for user conductor
2021-10-09 23:36:23.023011 I | auth: deleting token UBwUoJbYJtJvRCVz.211 for user conductor
2021-10-09 23:36:23.023055 I | auth: deleting token MflbCPqeNfMqdgjM.210 for user conductor
2021-10-09 23:36:23.023069 I | auth: deleting token AQvbZcxaRHQIxtHM.206 for user conductor
2021-10-09 23:36:23.127498 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.200139004s) to execute
2021-10-09 23:36:23.127945 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.004532276s) to execute
2021-10-09 23:36:23.128160 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.104797653s) to execute
2021-10-09 23:36:23.723732 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:24.957840 I | auth: deleting token BLmbNuQZphXIFLfH.212 for user conductor
2021-10-09 23:36:24.957906 I | auth: deleting token BpOJOaypENVZojvu.213 for user conductor
2021-10-09 23:36:25.224500 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.967478525s) to execute
2021-10-09 23:36:25.455021 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (195.60189ms) to execute
2021-10-09 23:36:25.957763 I | auth: deleting token iNYdgtRsLkciXLuC.214 for user conductor
2021-10-09 23:36:28.724218 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:28.957893 I | auth: deleting token zabDMoiorKEbVRKB.216 for user conductor
2021-10-09 23:36:28.957953 I | auth: deleting token PzvfyVVvyqQglAxd.215 for user conductor
2021-10-09 23:36:30.957688 I | auth: deleting token XmoZcIVSIfpafDuL.217 for user conductor
2021-10-09 23:36:33.724665 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:33.957811 I | auth: deleting token qseacZOghOKFEnvQ.218 for user conductor
2021-10-09 23:36:34.957710 I | auth: deleting token JLUekxRrqarUXwLx.220 for user conductor
2021-10-09 23:36:38.124088 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (400.593194ms) to execute
2021-10-09 23:36:38.725034 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:39.957678 I | auth: deleting token QZifKVTADNGhzIfK.222 for user conductor
2021-10-09 23:36:39.957738 I | auth: deleting token icYfzaAnkQRVVXlH.221 for user conductor
2021-10-09 23:36:39.957751 I | auth: deleting token XOxzfHUOmIpHVENl.223 for user conductor
2021-10-09 23:36:39.957760 I | auth: deleting token BTOMwdFunnEZqFXI.219 for user conductor
2021-10-09 23:36:39.957769 I | auth: deleting token pITGYRQkRvLKlKDq.224 for user conductor
2021-10-09 23:36:40.325996 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (171.050522ms) to execute
2021-10-09 23:36:42.528068 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.171274997s) to execute
2021-10-09 23:36:43.725379 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:44.826164 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.102741625s) to execute
2021-10-09 23:36:45.957803 I | auth: deleting token fAtUqohXEQVAjTeA.225 for user conductor
2021-10-09 23:36:45.957889 I | auth: deleting token qvQfCJBetCePLFVX.226 for user conductor
2021-10-09 23:36:47.226007 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.397486182s) to execute
2021-10-09 23:36:47.226505 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.302990684s) to execute
2021-10-09 23:36:48.023610 I | auth: deleting token DyXbWbWickUEPNIy.228 for user conductor
2021-10-09 23:36:48.023677 I | auth: deleting token JHrznMfipxynpaMV.229 for user conductor
2021-10-09 23:36:48.023686 I | auth: deleting token sOtjGksbASYMCJrB.227 for user conductor
2021-10-09 23:36:48.725776 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:51.630587 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.275432867s) to execute
2021-10-09 23:36:51.631238 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.307601047s) to execute
2021-10-09 23:36:51.957737 I | auth: deleting token LkvmkIPZjqJMTMKT.232 for user conductor
2021-10-09 23:36:51.957797 I | auth: deleting token YFIdAakfewSzKXdU.231 for user conductor
2021-10-09 23:36:51.957813 I | auth: deleting token UTzVkqFLaRhtRIPt.230 for user conductor
2021-10-09 23:36:53.726057 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:36:55.825520 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.102029215s) to execute
2021-10-09 23:36:55.825671 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.102191448s) to execute
2021-10-09 23:36:55.825816 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.068468946s) to execute
2021-10-09 23:36:55.825973 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602628444s) to execute
2021-10-09 23:36:55.957717 I | auth: deleting token QrLZVKgYJTmcmznL.233 for user conductor
2021-10-09 23:36:55.957784 I | auth: deleting token thGBpyNfOMyzrRKx.234 for user conductor
2021-10-09 23:36:55.957809 I | auth: deleting token bMaNnwIWTPwSIBCj.235 for user conductor
2021-10-09 23:36:58.125831 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.102479074s) to execute
2021-10-09 23:36:58.726386 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:01.023137 I | auth: deleting token NzMTIjcLIktOYCuQ.237 for user conductor
2021-10-09 23:37:01.023169 I | auth: deleting token LevdFESgpehlysRs.238 for user conductor
2021-10-09 23:37:01.023178 I | auth: deleting token hLdxXJkxxRqeBZHQ.236 for user conductor
2021-10-09 23:37:01.731691 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.476978366s) to execute
2021-10-09 23:37:01.926460 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (102.989431ms) to execute
2021-10-09 23:37:01.955774 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.888722ms) to execute
2021-10-09 23:37:03.023092 I | auth: deleting token SYfgkPTwwuAUREnm.240 for user conductor
2021-10-09 23:37:03.023177 I | auth: deleting token TuUIpGyEPajKxHkL.239 for user conductor
2021-10-09 23:37:03.726661 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:05.023118 I | auth: deleting token gQJdjNgLDUEktwis.242 for user conductor
2021-10-09 23:37:05.023204 I | auth: deleting token TgmAWWngFPRYMiPZ.241 for user conductor
2021-10-09 23:37:05.023220 I | auth: deleting token LDLKtPNThPozSKTO.243 for user conductor
2021-10-09 23:37:05.727896 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.704480935s) to execute
2021-10-09 23:37:05.955144 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (207.439058ms) to execute
2021-10-09 23:37:07.928203 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (804.892211ms) to execute
2021-10-09 23:37:08.823115 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:08.957708 I | auth: deleting token vnRPByBvNHPOemMo.245 for user conductor
2021-10-09 23:37:09.957780 I | auth: deleting token AlKOjjJIbYNQusQR.244 for user conductor
2021-10-09 23:37:09.957840 I | auth: deleting token DECHlfHHVioRoWXD.246 for user conductor
2021-10-09 23:37:10.023465 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.068784502s) to execute
2021-10-09 23:37:10.957794 I | auth: deleting token LLxOSiPkzaYNFOwk.247 for user conductor
2021-10-09 23:37:10.957846 I | auth: deleting token HrkAPgxxqwSCxnZe.248 for user conductor
2021-10-09 23:37:11.824022 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.798600028s) to execute
2021-10-09 23:37:11.824165 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.669354793s) to execute
2021-10-09 23:37:13.724279 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.897654783s) to execute
2021-10-09 23:37:13.724568 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.701122703s) to execute
2021-10-09 23:37:13.823383 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:14.957742 I | auth: deleting token yXqlXDyNySrXsnJb.249 for user conductor
2021-10-09 23:37:15.957717 I | auth: deleting token oGfYrGIFdscBBLlP.251 for user conductor
2021-10-09 23:37:15.957778 I | auth: deleting token WJSZdQXYvAXyPACG.250 for user conductor
2021-10-09 23:37:18.823686 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:22.023148 I | auth: deleting token SShefKTjvvxXaVaE.254 for user conductor
2021-10-09 23:37:22.023192 I | auth: deleting token WCoDxXQStRizLmJf.252 for user conductor
2021-10-09 23:37:22.023200 I | auth: deleting token mVLDgbtoBixEYYcf.255 for user conductor
2021-10-09 23:37:22.023215 I | auth: deleting token YwMUlAqgynBZUsuz.253 for user conductor
2021-10-09 23:37:22.023225 I | auth: deleting token gKFtjjbMAfUQkUjk.256 for user conductor
2021-10-09 23:37:22.023231 I | auth: deleting token fPLRHDjFeYOWCgiP.257 for user conductor
2021-10-09 23:37:23.823979 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:23.923652 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (7.900230066s) to execute
2021-10-09 23:37:25.826882 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.803490802s) to execute
2021-10-09 23:37:25.827141 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.900695779s) to execute
2021-10-09 23:37:25.925029 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.997642975s) to execute
2021-10-09 23:37:25.925171 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.998256548s) to execute
2021-10-09 23:37:26.023156 I | auth: deleting token qUHXErWxWvZgbrvw.259 for user conductor
2021-10-09 23:37:26.023212 I | auth: deleting token kADNjzWUzhqUtFzr.260 for user conductor
2021-10-09 23:37:26.023230 I | auth: deleting token WGcloeekPYHupAuL.258 for user conductor
2021-10-09 23:37:28.824265 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:29.630700 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (3.507097438s) to execute
2021-10-09 23:37:30.957682 I | auth: deleting token CaYdDxJDlsuCdsAD.264 for user conductor
2021-10-09 23:37:30.957723 I | auth: deleting token lgijaLvUjFuCKMBV.262 for user conductor
2021-10-09 23:37:30.957735 I | auth: deleting token ADhQLYlsIJDgpgXs.263 for user conductor
2021-10-09 23:37:30.957740 I | auth: deleting token yekwwMjjzBneNEiZ.261 for user conductor
2021-10-09 23:37:31.730588 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.907315484s) to execute
2021-10-09 23:37:31.730742 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.007293909s) to execute
2021-10-09 23:37:33.054151 I | auth: deleting token oKiKrWGuFuuRWrmI.265 for user conductor
2021-10-09 23:37:33.726854 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.903205069s) to execute
2021-10-09 23:37:33.727161 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.86949943s) to execute
2021-10-09 23:37:33.727238 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (802.735043ms) to execute
2021-10-09 23:37:33.824490 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:33.957725 I | auth: deleting token wveGhcgempHSfpEi.266 for user conductor
2021-10-09 23:37:38.023189 I | auth: deleting token OSNGTmmTHhzWtRdc.268 for user conductor
2021-10-09 23:37:38.824701 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:37:39.928824 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.10546038s) to execute
2021-10-09 23:37:41.957758 I | auth: deleting token xCJAGPYMbSqNwYRK.267 for user conductor
2021-10-09 23:37:41.957817 I | auth: deleting token GwhOORMmUFThfTlV.270 for user conductor
2021-10-09 23:37:41.957834 I | auth: deleting token iagLQMNteVSHJlVj.271 for user conductor
2021-10-09 23:37:41.957843 I | auth: deleting token klsWhhNlFPyHenyR.272 for user conductor
2021-10-09 23:37:41.957856 I | auth: deleting token QVDmVOhrgTiTwhJi.269 for user conductor
2021-10-09 23:37:42.229687 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.006337216s) to execute
2021-10-09 23:37:43.824939 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:37:43.957773 I | auth: deleting token xfzvYiwcANlYhNCR.273 for user conductor
2021-10-09 23:37:43.957862 I | auth: deleting token bHhZlKgJsFoGQYFL.274 for user conductor
2021-10-09 23:37:46.023119 I | auth: deleting token fuTfhZeOcjpumkJQ.275 for user conductor
2021-10-09 23:37:48.025928 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.701322707s) to execute
2021-10-09 23:37:48.825263 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:37:48.957778 I | auth: deleting token KeREifsELIZniUiE.276 for user conductor
2021-10-09 23:37:48.957850 I | auth: deleting token qTEnAjCjJnzslUlv.277 for user conductor
2021-10-09 23:37:49.729112 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.605660521s) to execute
2021-10-09 23:37:49.729369 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.701093764s) to execute
2021-10-09 23:37:49.826126 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.702609294s) to execute
2021-10-09 23:37:49.826317 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.797750753s) to execute
2021-10-09 23:37:49.957804 I | auth: deleting token UbdxyVXBwboWlXyF.278 for user conductor
2021-10-09 23:37:51.830935 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.007398889s) to execute
2021-10-09 23:37:51.831277 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.907792023s) to execute
2021-10-09 23:37:52.957720 I | auth: deleting token EGRUJbZITvfsucTw.279 for user conductor
2021-10-09 23:37:53.825588 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:37:55.023165 I | auth: deleting token iCOlvvnrUuSzcyIR.280 for user conductor
2021-10-09 23:37:56.223245 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (299.956077ms) to execute
2021-10-09 23:37:58.825933 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:37:59.957928 I | auth: deleting token zZSzchMuAjnmzvVW.282 for user conductor
2021-10-09 23:37:59.958001 I | auth: deleting token cbKNpeFJEzRWtFFE.284 for user conductor
2021-10-09 23:38:01.957724 I | auth: deleting token IXuCHMLisNDYJPGF.281 for user conductor
2021-10-09 23:38:01.957770 I | auth: deleting token mdomQAuAYYbbRVxp.283 for user conductor
2021-10-09 23:38:01.957780 I | auth: deleting token RcOlRThwDgHrBOgJ.285 for user conductor
2021-10-09 23:38:03.923180 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:03.957780 I | auth: deleting token gqWMosbMQWeTZFcV.287 for user conductor
2021-10-09 23:38:03.957841 I | auth: deleting token DvepDPWtQlQLCTjf.286 for user conductor
2021-10-09 23:38:08.923449 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:10.023119 I | auth: deleting token KceHjuoIlCdLNauv.289 for user conductor
2021-10-09 23:38:10.023173 I | auth: deleting token YzGqZKBCVJkegqIh.291 for user conductor
2021-10-09 23:38:11.227996 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.971228023s) to execute
2021-10-09 23:38:11.355308 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (124.84224ms) to execute
2021-10-09 23:38:11.355432 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (124.827553ms) to execute
2021-10-09 23:38:11.355495 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (124.849802ms) to execute
2021-10-09 23:38:11.554806 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (231.238689ms) to execute
2021-10-09 23:38:11.957775 I | auth: deleting token nAkPuJrwkceJQOnb.293 for user conductor
2021-10-09 23:38:11.957834 I | auth: deleting token mkOHYURrUUrEiMjA.290 for user conductor
2021-10-09 23:38:11.957846 I | auth: deleting token pOYfiIgxUGbitdJm.292 for user conductor
2021-10-09 23:38:11.957857 I | auth: deleting token RpXvflAvhURBdyCe.294 for user conductor
2021-10-09 23:38:11.957868 I | auth: deleting token zbPtMoAKupfVKwzI.288 for user conductor
2021-10-09 23:38:14.023445 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:16.023150 I | auth: deleting token yFyhtmDjnZUBoQXg.296 for user conductor
2021-10-09 23:38:16.957741 I | auth: deleting token MjfgTXWbpJYrUnCQ.295 for user conductor
2021-10-09 23:38:16.957805 I | auth: deleting token jCuyHWeJGbwvFzNJ.297 for user conductor
2021-10-09 23:38:17.528876 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.202697785s) to execute
2021-10-09 23:38:18.023236 I | auth: deleting token qsLxcsMuRtrdvchi.298 for user conductor
2021-10-09 23:38:19.023770 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:20.957686 I | auth: deleting token lFwcflweGKJXswgd.299 for user conductor
2021-10-09 23:38:20.957726 I | auth: deleting token mYGmqXRHacdNRNnl.300 for user conductor
2021-10-09 23:38:22.957685 I | auth: deleting token ZcrIfhNxqUIasdMR.301 for user conductor
2021-10-09 23:38:22.957765 I | auth: deleting token SvpybEGvLAUWnXbo.302 for user conductor
2021-10-09 23:38:24.024027 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:25.429225 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.374482457s) to execute
2021-10-09 23:38:26.957843 I | auth: deleting token gXkRPAFHvZkZpSRN.305 for user conductor
2021-10-09 23:38:26.957897 I | auth: deleting token dOpUNzIixKAYjswX.303 for user conductor
2021-10-09 23:38:26.957912 I | auth: deleting token WgemSsCXDBSDwDTy.304 for user conductor
2021-10-09 23:38:27.223657 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.600202025s) to execute
2021-10-09 23:38:27.223910 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.600544314s) to execute
2021-10-09 23:38:27.227613 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.603933559s) to execute
2021-10-09 23:38:27.227790 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.604382256s) to execute
2021-10-09 23:38:29.024284 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:30.957711 I | auth: deleting token ZqYAdDYmxheJgXEL.307 for user conductor
2021-10-09 23:38:30.957787 I | auth: deleting token GRBHVcWEmLvWBZIE.308 for user conductor
2021-10-09 23:38:30.957810 I | auth: deleting token ndlrETpAmuiNPGBl.306 for user conductor
2021-10-09 23:38:33.957882 I | auth: deleting token INuDXnGgbMhCzNrJ.309 for user conductor
2021-10-09 23:38:34.024466 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:35.957630 I | auth: deleting token duLOJNKGgjQDiPdf.310 for user conductor
2021-10-09 23:38:35.957661 I | auth: deleting token SOxBzVqmGiyVWUvl.311 for user conductor
2021-10-09 23:38:37.957806 I | auth: deleting token XMnlcahmYeUcPZRU.312 for user conductor
2021-10-09 23:38:37.957874 I | auth: deleting token AJHPIQsPIYJbxTPx.314 for user conductor
2021-10-09 23:38:37.957911 I | auth: deleting token aGPWAadIADivPhTJ.313 for user conductor
2021-10-09 23:38:39.024757 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:39.957771 I | auth: deleting token UrlWIhVuKtAWISne.315 for user conductor
2021-10-09 23:38:42.957786 I | auth: deleting token NEgkfdVMIVPugjQe.316 for user conductor
2021-10-09 23:38:42.957868 I | auth: deleting token CVFdSnhtgUVqneps.317 for user conductor
2021-10-09 23:38:44.025029 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:44.957760 I | auth: deleting token YBYXDfNrORTggwAW.318 for user conductor
2021-10-09 23:38:44.957843 I | auth: deleting token BxfQNNmNEKAsVsra.319 for user conductor
2021-10-09 23:38:45.957850 I | auth: deleting token GirxIbpledBKrakj.320 for user conductor
2021-10-09 23:38:47.131763 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802795872s) to execute
2021-10-09 23:38:48.928767 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.793246941s) to execute
2021-10-09 23:38:48.928981 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.794707803s) to execute
2021-10-09 23:38:48.957827 I | auth: deleting token bYBwPAzUmTHTVQLg.322 for user conductor
2021-10-09 23:38:48.957910 I | auth: deleting token cQyBLynbmztIQnrD.321 for user conductor
2021-10-09 23:38:49.025335 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:52.926256 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.002934679s) to execute
2021-10-09 23:38:54.025639 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:54.926082 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.871019143s) to execute
2021-10-09 23:38:56.957796 I | auth: deleting token DQNATkmnzazieFPQ.325 for user conductor
2021-10-09 23:38:56.957855 I | auth: deleting token RiOreziNycJZIsAB.327 for user conductor
2021-10-09 23:38:56.957867 I | auth: deleting token fnbgYLOrPLOsEvuG.326 for user conductor
2021-10-09 23:38:56.957878 I | auth: deleting token BDRhzkMbnIQrWcSN.324 for user conductor
2021-10-09 23:38:56.957891 I | auth: deleting token wgkVPsNNRlCkbvUR.323 for user conductor
2021-10-09 23:38:59.025890 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:38:59.957707 I | auth: deleting token sujlRhtGWHvaMdUX.328 for user conductor
2021-10-09 23:38:59.957763 I | auth: deleting token GQDTZOHCjcNgbHQC.329 for user conductor
2021-10-09 23:39:01.030163 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.47525346s) to execute
2021-10-09 23:39:02.023064 I | auth: deleting token EeBHnavXVjuQGNLP.330 for user conductor
2021-10-09 23:39:02.023154 I | auth: deleting token BPyLVdZRZUGzsVUE.331 for user conductor
2021-10-09 23:39:03.023827 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (369.15025ms) to execute
2021-10-09 23:39:03.957731 I | auth: deleting token AqwNsMpFKSAErKCq.332 for user conductor
2021-10-09 23:39:04.026217 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:04.724532 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.696361448s) to execute
2021-10-09 23:39:07.227572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.072618731s) to execute
2021-10-09 23:39:09.023192 I | auth: deleting token eldemObJBuThPboQ.334 for user conductor
2021-10-09 23:39:09.123200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:09.427037 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.072259859s) to execute
2021-10-09 23:39:11.431711 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.873937302s) to execute
2021-10-09 23:39:11.523223 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (699.91113ms) to execute
2021-10-09 23:39:14.123562 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:15.957710 I | auth: deleting token NokQFsDjBzJyDyxk.336 for user conductor
2021-10-09 23:39:15.957761 I | auth: deleting token eYMkDNXdJwhTrPYz.333 for user conductor
2021-10-09 23:39:15.957776 I | auth: deleting token kxldqrGdOUToRQxC.338 for user conductor
2021-10-09 23:39:15.957783 I | auth: deleting token bhiAzxIgxxiAPERs.337 for user conductor
2021-10-09 23:39:15.957792 I | auth: deleting token zfewOyhwPggIbpSZ.335 for user conductor
2021-10-09 23:39:19.123967 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:19.827780 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (673.08834ms) to execute
2021-10-09 23:39:19.957680 I | auth: deleting token svovjaweIrbXOQrK.340 for user conductor
2021-10-09 23:39:19.957733 I | auth: deleting token sMVbPprEVBFiTjLp.341 for user conductor
2021-10-09 23:39:22.023233 I | auth: deleting token CFidTkQmmWAoGMvh.342 for user conductor
2021-10-09 23:39:22.023291 I | auth: deleting token xdSgFlWeTBprPvrG.343 for user conductor
2021-10-09 23:39:22.227963 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (373.243497ms) to execute
2021-10-09 23:39:24.124400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:25.957750 I | auth: deleting token KUJeZPwNMDcrzMNa.344 for user conductor
2021-10-09 23:39:25.957811 I | auth: deleting token fHfzWARBpQiOMZXG.347 for user conductor
2021-10-09 23:39:25.957835 I | auth: deleting token mzRTYCIsWkBdUGDr.348 for user conductor
2021-10-09 23:39:25.957844 I | auth: deleting token jqWAqjNngJNQRFuR.346 for user conductor
2021-10-09 23:39:27.426755 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (103.327293ms) to execute
2021-10-09 23:39:27.957786 I | auth: deleting token cPyUiQPFZGBjIfJo.349 for user conductor
2021-10-09 23:39:28.957794 I | auth: deleting token hmqEikgRYIIvRjyM.350 for user conductor
2021-10-09 23:39:29.124736 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:31.957640 I | auth: deleting token QTarJmUrdgKVsJUI.352 for user conductor
2021-10-09 23:39:31.957695 I | auth: deleting token XZNliVZSMMiUNVLy.351 for user conductor
2021-10-09 23:39:31.957710 I | auth: deleting token zHwlTovviMguJVTE.353 for user conductor
2021-10-09 23:39:34.124991 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:37.023221 I | auth: deleting token bxIFDzUbBygtkXYx.355 for user conductor
2021-10-09 23:39:37.023308 I | auth: deleting token KfTCUEZLvdHaAmIx.356 for user conductor
2021-10-09 23:39:37.023322 I | auth: deleting token RlRDgWonnSxcyYav.354 for user conductor
2021-10-09 23:39:38.957783 I | auth: deleting token SwmmCUqiksmxPRfU.357 for user conductor
2021-10-09 23:39:39.223171 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:39.930218 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.000136137s) to execute
2021-10-09 23:39:40.023181 I | auth: deleting token tYKVziBXJldhRLxH.358 for user conductor
2021-10-09 23:39:40.155344 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (131.713666ms) to execute
2021-10-09 23:39:40.155477 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.874209ms) to execute
2021-10-09 23:39:40.157509 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (133.867313ms) to execute
2021-10-09 23:39:41.023067 I | auth: deleting token iPvJViMyWTUSAPfh.359 for user conductor
2021-10-09 23:39:43.023179 I | auth: deleting token FRdJmzqSyaKlcIpp.361 for user conductor
2021-10-09 23:39:44.223551 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:46.025625 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.670304108s) to execute
2021-10-09 23:39:46.155023 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.957896ms) to execute
2021-10-09 23:39:46.156779 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.733381ms) to execute
2021-10-09 23:39:46.957711 I | auth: deleting token ABlLXdZZDcyOZFbq.360 for user conductor
2021-10-09 23:39:48.324973 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.198701454s) to execute
2021-10-09 23:39:48.957867 I | auth: deleting token xgVttZvTASlWTVmk.365 for user conductor
2021-10-09 23:39:48.957933 I | auth: deleting token NBhjlSSjTtSHzooY.364 for user conductor
2021-10-09 23:39:48.957949 I | auth: deleting token GrfymJeIESdOuumA.362 for user conductor
2021-10-09 23:39:48.957961 I | auth: deleting token tVfqIvbBZsdYGPNJ.363 for user conductor
2021-10-09 23:39:49.223860 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:50.126660 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700635503s) to execute
2021-10-09 23:39:50.254825 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (125.449666ms) to execute
2021-10-09 23:39:51.023191 I | auth: deleting token ZhQGElTVGSBjCqhZ.366 for user conductor
2021-10-09 23:39:51.023260 I | auth: deleting token cnToKwEWRyyfTSfO.367 for user conductor
2021-10-09 23:39:53.023333 I | auth: deleting token xnzvPGJkmVRqqBwz.368 for user conductor
2021-10-09 23:39:54.224073 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:39:54.227543 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.972694821s) to execute
2021-10-09 23:39:55.957730 I | auth: deleting token spVrOVUxsyuqEIqZ.369 for user conductor
2021-10-09 23:39:56.231249 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.000436938s) to execute
2021-10-09 23:39:56.231449 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.974916973s) to execute
2021-10-09 23:39:58.023197 I | auth: deleting token mhOHDKqEzkobGpzL.371 for user conductor
2021-10-09 23:39:58.023283 I | auth: deleting token NxTvFFcQHcalEOBo.370 for user conductor
2021-10-09 23:39:58.527180 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.19870182s) to execute
2021-10-09 23:39:59.224462 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:00.324187 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.997913719s) to execute
2021-10-09 23:40:02.131557 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.807264673s) to execute
2021-10-09 23:40:02.355926 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (132.510675ms) to execute
2021-10-09 23:40:02.356027 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.550416ms) to execute
2021-10-09 23:40:03.023264 I | auth: deleting token kZQSInuGjYeSoDZU.374 for user conductor
2021-10-09 23:40:03.023340 I | auth: deleting token WMFQlEBjNjTRpUxJ.372 for user conductor
2021-10-09 23:40:04.224731 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:04.224894 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (800.114119ms) to execute
2021-10-09 23:40:04.957802 I | auth: deleting token OJmeWTcrBrUWNMZF.376 for user conductor
2021-10-09 23:40:04.957922 I | auth: deleting token bTzptwHPeutkJkVt.375 for user conductor
2021-10-09 23:40:04.957955 I | auth: deleting token ztLyohHqgxmZuyJD.373 for user conductor
2021-10-09 23:40:08.523396 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.047005ms) to execute
2021-10-09 23:40:08.957824 I | auth: deleting token hhdmLsFQKpeBomzP.377 for user conductor
2021-10-09 23:40:09.224980 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:10.423571 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.265793362s) to execute
2021-10-09 23:40:12.528301 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (472.345635ms) to execute
2021-10-09 23:40:14.228082 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:16.023060 I | auth: deleting token rIlurBwHQpwmRJjG.381 for user conductor
2021-10-09 23:40:16.023165 I | auth: deleting token mNCoIpCIKnQUGJNQ.378 for user conductor
2021-10-09 23:40:16.023178 I | auth: deleting token ncQwMHiOHKwYHJjM.379 for user conductor
2021-10-09 23:40:16.023186 I | auth: deleting token mSWOFKkPGUhQYmXS.380 for user conductor
2021-10-09 23:40:16.023193 I | auth: deleting token uLVFsqkCwHVbnvzf.382 for user conductor
2021-10-09 23:40:16.625005 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.098969077s) to execute
2021-10-09 23:40:19.323574 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:19.957916 I | auth: deleting token HjkcyLpMoiFiImqm.385 for user conductor
2021-10-09 23:40:19.957981 I | auth: deleting token aWXwBWhEwOCNhwSx.383 for user conductor
2021-10-09 23:40:19.958003 I | auth: deleting token SwclLgKamkpTSiMH.384 for user conductor
2021-10-09 23:40:21.957816 I | auth: deleting token nzXcXpqeHWVFkAdG.386 for user conductor
2021-10-09 23:40:22.024861 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.301333834s) to execute
2021-10-09 23:40:22.025145 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.39695885s) to execute
2021-10-09 23:40:24.323830 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:24.957808 I | auth: deleting token ruPXkcsPzVwJlXjx.387 for user conductor
2021-10-09 23:40:24.957864 I | auth: deleting token dPROIQwBRVyTvwyW.389 for user conductor
2021-10-09 23:40:24.957876 I | auth: deleting token oXIKOtUsXUHzUSOC.388 for user conductor
2021-10-09 23:40:26.023902 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.165023239s) to execute
2021-10-09 23:40:27.023247 I | auth: deleting token dzPfXilrwWjkdpaD.390 for user conductor
2021-10-09 23:40:27.023304 I | auth: deleting token uMQrFCCteddgJNoi.391 for user conductor
2021-10-09 23:40:27.724131 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.599368802s) to execute
2021-10-09 23:40:27.854828 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.203825ms) to execute
2021-10-09 23:40:29.324176 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:30.023286 I | auth: deleting token jlsIworErjbjwaWZ.392 for user conductor
2021-10-09 23:40:31.526467 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.77169587s) to execute
2021-10-09 23:40:32.957904 I | auth: deleting token ksrJpTyWBDBDdbUO.393 for user conductor
2021-10-09 23:40:34.324463 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:35.023634 I | auth: deleting token dSUXTqsTyBymkQWY.394 for user conductor
2021-10-09 23:40:35.727440 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.372851494s) to execute
2021-10-09 23:40:37.628229 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.47379056s) to execute
2021-10-09 23:40:38.957779 I | auth: deleting token WZqAlzrCNAvbpmmQ.395 for user conductor
2021-10-09 23:40:39.324687 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:41.023061 I | auth: deleting token xqeBaUXmZvBqKOll.397 for user conductor
2021-10-09 23:40:41.023113 I | auth: deleting token cZKXKVGLSPYtklzP.396 for user conductor
2021-10-09 23:40:44.325036 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:44.530124 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.706528917s) to execute
2021-10-09 23:40:44.957812 I | auth: deleting token DxtSUNzVrvDtYxNV.401 for user conductor
2021-10-09 23:40:46.624162 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.969504287s) to execute
2021-10-09 23:40:46.624323 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.000831598s) to execute
2021-10-09 23:40:46.954924 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (328.358902ms) to execute
2021-10-09 23:40:46.957768 I | auth: deleting token TkRHXYTXlklbdZPa.398 for user conductor
2021-10-09 23:40:46.957810 I | auth: deleting token DIgDUYRPBayVtWik.403 for user conductor
2021-10-09 23:40:46.957822 I | auth: deleting token ObRBBRSqRqWKpXUN.402 for user conductor
2021-10-09 23:40:46.957829 I | auth: deleting token PQHIHjLskDDkPLXm.400 for user conductor
2021-10-09 23:40:49.325296 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:50.957679 I | auth: deleting token IywcsmyTQoTNdulJ.404 for user conductor
2021-10-09 23:40:52.023191 I | auth: deleting token pjfGvzmUclwLLZxj.405 for user conductor
2021-10-09 23:40:52.023264 I | auth: deleting token rbdOoiZQoYhiDoSj.406 for user conductor
2021-10-09 23:40:53.123624 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.268656336s) to execute
2021-10-09 23:40:53.255887 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (129.064944ms) to execute
2021-10-09 23:40:53.957693 I | auth: deleting token OABHwQwcXKLVVXYh.408 for user conductor
2021-10-09 23:40:53.957868 I | auth: deleting token HoNuXleQmEvtVxNL.409 for user conductor
2021-10-09 23:40:53.957955 I | auth: deleting token QZepXzdkEFjpDWRx.407 for user conductor
2021-10-09 23:40:54.325669 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:40:56.957681 I | auth: deleting token qrItMwFjkuBjfBGy.411 for user conductor
2021-10-09 23:40:58.957817 I | auth: deleting token sTWkuzbVdJMDruuP.412 for user conductor
2021-10-09 23:40:59.325954 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:04.023303 I | auth: deleting token ZZuSTXFVmqRMOYzm.413 for user conductor
2021-10-09 23:41:04.126047 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.502530347s) to execute
2021-10-09 23:41:04.326368 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:05.957779 I | auth: deleting token LcVmdySDjOMiCRfM.414 for user conductor
2021-10-09 23:41:05.957840 I | auth: deleting token EJMznknaFjxFQXFI.415 for user conductor
2021-10-09 23:41:05.957857 I | auth: deleting token ZDOeHcUbpGejyaIE.416 for user conductor
2021-10-09 23:41:05.957868 I | auth: deleting token lmWESWLWTzWPMZwC.417 for user conductor
2021-10-09 23:41:06.426518 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.201811886s) to execute
2021-10-09 23:41:08.426312 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.999633432s) to execute
2021-10-09 23:41:08.554856 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.311553ms) to execute
2021-10-09 23:41:09.326674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:10.229339 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.672241993s) to execute
2021-10-09 23:41:10.957829 I | auth: deleting token PRJQubQeLWctEfwM.418 for user conductor
2021-10-09 23:41:10.957895 I | auth: deleting token bzymLqIvftRWqnPx.420 for user conductor
2021-10-09 23:41:14.327356 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:14.957822 I | auth: deleting token qrSWJqqpWMIrYSdQ.419 for user conductor
2021-10-09 23:41:16.957766 I | auth: deleting token teZEffabKxVolqhO.422 for user conductor
2021-10-09 23:41:16.957888 I | auth: deleting token AnQTCDJzmkVffWYs.421 for user conductor
2021-10-09 23:41:18.957820 I | auth: deleting token eQnNJWBvJmaQNVhV.423 for user conductor
2021-10-09 23:41:19.327560 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:19.957683 I | auth: deleting token MEAmgqRxPFslXPYc.424 for user conductor
2021-10-09 23:41:20.957744 I | auth: deleting token XcJKAmSVXKYIweHH.426 for user conductor
2021-10-09 23:41:22.827398 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.67098033s) to execute
2021-10-09 23:41:23.957773 I | auth: deleting token IRIGidzoqCmESGIC.428 for user conductor
2021-10-09 23:41:23.957844 I | auth: deleting token LcbyWnvTMeArayeJ.427 for user conductor
2021-10-09 23:41:23.957859 I | auth: deleting token EjPuhsyhqfYuWwDP.429 for user conductor
2021-10-09 23:41:23.957871 I | auth: deleting token fjnYkVcqcFrLQTUr.425 for user conductor
2021-10-09 23:41:24.327857 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:25.957686 I | auth: deleting token aQIHWaxcInPOINmv.430 for user conductor
2021-10-09 23:41:26.027130 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.072142726s) to execute
2021-10-09 23:41:26.156185 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.633442ms) to execute
2021-10-09 23:41:26.254742 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (131.18904ms) to execute
2021-10-09 23:41:26.356546 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.976772ms) to execute
2021-10-09 23:41:26.957807 I | auth: deleting token HCxLJWNwXUsNvfwd.431 for user conductor
2021-10-09 23:41:29.023172 I | auth: deleting token IZiBCHnPgxTAUAZE.432 for user conductor
2021-10-09 23:41:29.328056 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:29.825729 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (300.042251ms) to execute
2021-10-09 23:41:32.023199 I | auth: deleting token NBSswLBswfmlNvgN.433 for user conductor
2021-10-09 23:41:34.328356 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:36.023197 I | auth: deleting token znFqWPworENfzIQG.434 for user conductor
2021-10-09 23:41:38.525178 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.168197056s) to execute
2021-10-09 23:41:38.957787 I | auth: deleting token JBjJeKsGilFOiDUJ.436 for user conductor
2021-10-09 23:41:38.957870 I | auth: deleting token EzyGVEFpYLcEecgQ.435 for user conductor
2021-10-09 23:41:39.328808 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:41.123100 I | auth: deleting token nyGsygLTCjfxTkYf.438 for user conductor
2021-10-09 23:41:42.124945 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.501448384s) to execute
2021-10-09 23:41:42.125201 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.501627826s) to execute
2021-10-09 23:41:42.254880 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.541261ms) to execute
2021-10-09 23:41:42.454697 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (327.070232ms) to execute
2021-10-09 23:41:42.457073 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (199.66635ms) to execute
2021-10-09 23:41:43.023851 I | auth: deleting token bnIBInQZJatVQVNC.439 for user conductor
2021-10-09 23:41:44.328973 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:45.023119 I | auth: deleting token ZLqULMVshtlDSzfR.440 for user conductor
2021-10-09 23:41:45.023172 I | auth: deleting token fHcCgMQcADNSPrsr.442 for user conductor
2021-10-09 23:41:45.731749 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.208402291s) to execute
2021-10-09 23:41:47.628442 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (405.187797ms) to execute
2021-10-09 23:41:47.957953 I | auth: deleting token lEojCMvToQpjzVer.444 for user conductor
2021-10-09 23:41:49.329209 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:51.957845 I | auth: deleting token gKgTGmafaAvBskbs.445 for user conductor
2021-10-09 23:41:51.957910 I | auth: deleting token ZSVivrrjrAgQuihY.446 for user conductor
2021-10-09 23:41:51.957928 I | auth: deleting token iyZrhOHFQnlxRiDn.447 for user conductor
2021-10-09 23:41:51.957941 I | auth: deleting token yXjntxFJdvTciEgS.443 for user conductor
2021-10-09 23:41:54.329510 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:41:56.957820 I | auth: deleting token qslmhpVgvlKnbKnL.449 for user conductor
2021-10-09 23:41:56.957888 I | auth: deleting token QMkPPNZqDSpvjrLf.448 for user conductor
2021-10-09 23:41:59.329812 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:01.129453 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.974990784s) to execute
2021-10-09 23:42:01.957775 I | auth: deleting token EOLVtSxGLuLLiIZH.452 for user conductor
2021-10-09 23:42:01.957834 I | auth: deleting token XDxKGgannWszUbZo.451 for user conductor
2021-10-09 23:42:01.957853 I | auth: deleting token AYyFplGNiANjdMPF.453 for user conductor
2021-10-09 23:42:01.957863 I | auth: deleting token FggMLsiPesMnDcZi.450 for user conductor
2021-10-09 23:42:02.927644 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.704235533s) to execute
2021-10-09 23:42:02.957778 I | auth: deleting token ErixXBqJQzlCLHxD.454 for user conductor
2021-10-09 23:42:04.330077 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:04.925217 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.792783845s) to execute
2021-10-09 23:42:04.925339 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.701973284s) to execute
2021-10-09 23:42:04.925512 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.994548968s) to execute
2021-10-09 23:42:04.925744 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.995040351s) to execute
2021-10-09 23:42:06.023220 I | auth: deleting token lKaOaZkEmwFwWCKK.455 for user conductor
2021-10-09 23:42:06.023273 I | auth: deleting token XeoFeImEBAICCpvc.456 for user conductor
2021-10-09 23:42:06.023288 I | auth: deleting token hJmRJmEhredPkpfT.457 for user conductor
2021-10-09 23:42:08.023076 I | auth: deleting token CBSoZHpoXaEfqPKZ.458 for user conductor
2021-10-09 23:42:09.330396 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:11.023127 I | auth: deleting token vPxfeQiQdnPLMKnP.460 for user conductor
2021-10-09 23:42:11.023184 I | auth: deleting token MSOwczrQzmOntiOZ.459 for user conductor
2021-10-09 23:42:12.957793 I | auth: deleting token UcfogFszYyCrUFQl.461 for user conductor
2021-10-09 23:42:13.957715 I | auth: deleting token agfhvbRoPKLqZBHD.464 for user conductor
2021-10-09 23:42:13.957786 I | auth: deleting token MZbnNTtzchqDJspf.463 for user conductor
2021-10-09 23:42:13.957803 I | auth: deleting token PAlGcfKFPRPByWEs.462 for user conductor
2021-10-09 23:42:14.423260 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:15.623036 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.197892214s) to execute
2021-10-09 23:42:17.531711 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.808172922s) to execute
2021-10-09 23:42:17.623241 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.899702055s) to execute
2021-10-09 23:42:17.723778 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.900519179s) to execute
2021-10-09 23:42:17.723860 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.00025888s) to execute
2021-10-09 23:42:17.726647 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (103.201528ms) to execute
2021-10-09 23:42:19.423694 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:19.628806 W | etcdserver: request "header: txn: success:> failure:<>>" with result "size:4" took too long (1.801382423s) to execute
2021-10-09 23:42:23.328218 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.67339517s) to execute
2021-10-09 23:42:23.455699 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (124.580164ms) to execute
2021-10-09 23:42:23.556315 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (132.65537ms) to execute
2021-10-09 23:42:23.957768 I | auth: deleting token zRBWpOTVnhHMMGuN.465 for user conductor
2021-10-09 23:42:24.424055 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:26.023121 I | auth: deleting token KZAhQECeqpkjVSRr.468 for user conductor
2021-10-09 23:42:26.023184 I | auth: deleting token RUTilzJRrAAeXjxb.469 for user conductor
2021-10-09 23:42:26.023204 I | auth: deleting token peSfZkrtMVGcHKfp.466 for user conductor
2021-10-09 23:42:26.023227 I | auth: deleting token dNUqWycRZHdjMlJM.467 for user conductor
2021-10-09 23:42:26.957796 I | auth: deleting token TZBTgzXDnLwzgQKS.470 for user conductor
2021-10-09 23:42:28.854794 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.807838ms) to execute
2021-10-09 23:42:29.424380 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:29.957755 I | auth: deleting token NJIpplLGhGoRMjNO.473 for user conductor
2021-10-09 23:42:31.957775 I | auth: deleting token YxIkwVkFkWWYvlUt.474 for user conductor
2021-10-09 23:42:31.957844 I | auth: deleting token lEXVZCyRdzdnpVJT.472 for user conductor
2021-10-09 23:42:32.957838 I | auth: deleting token IgyPqxGWRJUWSPYE.475 for user conductor
2021-10-09 23:42:33.957808 I | auth: deleting token aWQJZlBYRuejRaMx.477 for user conductor
2021-10-09 23:42:33.957862 I | auth: deleting token NuIBPmanMgZHxzEK.476 for user conductor
2021-10-09 23:42:34.424812 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:35.957818 I | auth: deleting token zKNVAsWrBZIuQTWy.479 for user conductor
2021-10-09 23:42:38.227943 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.873495669s) to execute
2021-10-09 23:42:38.355067 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (124.716095ms) to execute
2021-10-09 23:42:38.957893 I | auth: deleting token oakLTILKKahhWnVF.480 for user conductor
2021-10-09 23:42:39.425131 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:39.957844 I | auth: deleting token btqPviFgHfTjrVsk.481 for user conductor
2021-10-09 23:42:40.957738 I | auth: deleting token BrwhLdCAdWnxymcz.482 for user conductor
2021-10-09 23:42:42.923915 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000347213s) to execute
2021-10-09 23:42:42.957758 I | auth: deleting token ouaaNWQaiBNpYSKm.483 for user conductor
2021-10-09 23:42:43.054637 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.49692ms) to execute
2021-10-09 23:42:44.425331 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:45.325990 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.562280512s) to execute
2021-10-09 23:42:47.326199 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (668.335642ms) to execute
2021-10-09 23:42:47.723910 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (266.402384ms) to execute
2021-10-09 23:42:49.425612 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:49.957824 I | auth: deleting token mxLaOlLLaGeldFRn.488 for user conductor
2021-10-09 23:42:49.957890 I | auth: deleting token lncVnRJBXroaLQvl.485 for user conductor
2021-10-09 23:42:49.957912 I | auth: deleting token tLniQFzQgTixCWIM.487 for user conductor
2021-10-09 23:42:49.957940 I | auth: deleting token sfEDvfaHIcxAAqDf.484 for user conductor
2021-10-09 23:42:49.957954 I | auth: deleting token JsuioVeeOzdDURWf.486 for user conductor
2021-10-09 23:42:52.957848 I | auth: deleting token JTQsBUhwQdiRSzxO.489 for user conductor
2021-10-09 23:42:53.957786 I | auth: deleting token mNohiTWLdxtIYzdB.490 for user conductor
2021-10-09 23:42:54.523114 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:42:57.023135 I | auth: deleting token KsmYkKGwGhtVFujs.492 for user conductor
2021-10-09 23:42:57.023206 I | auth: deleting token xbIqZCxnhuFGIANc.491 for user conductor
2021-10-09 23:42:57.527376 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (6.270877489s) to execute
2021-10-09 23:42:58.957842 I | auth: deleting token bZLAFOXOTPsRYFYi.493 for user conductor
2021-10-09 23:42:59.326241 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.700248671s) to execute
2021-10-09 23:42:59.326925 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.703432142s) to execute
2021-10-09 23:42:59.327260 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.703780669s) to execute
2021-10-09 23:42:59.423135 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.79952009s) to execute
2021-10-09 23:42:59.523483 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:00.957715 I | auth: deleting token VuJKmPfLuPNXKGOf.494 for user conductor
2021-10-09 23:43:03.957803 I | auth: deleting token lMfaPjdXMeIyxncs.495 for user conductor
2021-10-09 23:43:04.323750 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.562887902s) to execute
2021-10-09 23:43:04.455294 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (128.723721ms) to execute
2021-10-09 23:43:04.523743 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:08.325752 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.670984788s) to execute
2021-10-09 23:43:09.523937 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:10.230086 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.803893303s) to execute
2021-10-09 23:43:10.230233 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.806834376s) to execute
2021-10-09 23:43:12.023176 I | auth: deleting token vsHNkkvbPeVGoJqF.498 for user conductor
2021-10-09 23:43:12.023234 I | auth: deleting token UZtzYpzsvWUEyRCZ.500 for user conductor
2021-10-09 23:43:12.023267 I | auth: deleting token fmWxPzIfrksIAALm.499 for user conductor
2021-10-09 23:43:12.023318 I | auth: deleting token ZGSdTeRhupTuVfIx.496 for user conductor
2021-10-09 23:43:12.023331 I | auth: deleting token HUWEbeZhWKrWxqGR.497 for user conductor
2021-10-09 23:43:12.023353 I | auth: deleting token vuGDArJBaFqeFLMX.501 for user conductor
2021-10-09 23:43:12.324059 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.069470283s) to execute
2021-10-09 23:43:14.524170 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:17.957839 I | auth: deleting token FEwPkgXXxmbiLtKR.505 for user conductor
2021-10-09 23:43:17.957914 I | auth: deleting token QzfnfgPScfTLpauw.506 for user conductor
2021-10-09 23:43:17.957937 I | auth: deleting token WAyBXtbdKhAexnMM.502 for user conductor
2021-10-09 23:43:17.957963 I | auth: deleting token AopXHwQSoYvNieui.504 for user conductor
2021-10-09 23:43:17.957979 I | auth: deleting token gUTFtwuEdGVJTDOj.503 for user conductor
2021-10-09 23:43:19.524418 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:24.524584 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:25.224747 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.967276259s) to execute
2021-10-09 23:43:25.957776 I | auth: deleting token IVprfOanHiTdJNEZ.510 for user conductor
2021-10-09 23:43:25.957844 I | auth: deleting token qEKtKiylgFRKsHUn.507 for user conductor
2021-10-09 23:43:28.023066 I | auth: deleting token POGYcKrciBHeszij.512 for user conductor
2021-10-09 23:43:28.023139 I | auth: deleting token YUygTuXVWOeSWdqx.509 for user conductor
2021-10-09 23:43:28.023189 I | auth: deleting token YrJHkymoLCdeIOuu.511 for user conductor
2021-10-09 23:43:28.023202 I | auth: deleting token KwRTMsLmamixWlrw.513 for user conductor
2021-10-09 23:43:28.023215 I | auth: deleting token tafuNWtdhntGVoaG.508 for user conductor
2021-10-09 23:43:28.428310 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.673009539s) to execute
2021-10-09 23:43:29.524855 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:30.023670 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.400236655s) to execute
2021-10-09 23:43:30.155215 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (128.590967ms) to execute
2021-10-09 23:43:31.024224 I | auth: deleting token SDkIWuhTRnxfMVeC.515 for user conductor
2021-10-09 23:43:31.024290 I | auth: deleting token RhoaFXWJKoZsZSrl.514 for user conductor
2021-10-09 23:43:32.957728 I | auth: deleting token EnEjcTtqhQMYiSuu.516 for user conductor
2021-10-09 23:43:32.957781 I | auth: deleting token RRxYpdilFyPYsllm.517 for user conductor
2021-10-09 23:43:34.525173 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:34.526572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.172177804s) to execute
2021-10-09 23:43:35.957710 I | auth: deleting token XpxqDeYKLBLJvkLH.518 for user conductor
2021-10-09 23:43:35.957782 I | auth: deleting token myeWCZyKpFLAkzeh.519 for user conductor
2021-10-09 23:43:36.625661 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.670936562s) to execute
2021-10-09 23:43:38.732232 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.977476208s) to execute
2021-10-09 23:43:38.923595 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.135342ms) to execute
2021-10-09 23:43:38.957790 I | auth: deleting token XUVEBcrKNpppXxCJ.520 for user conductor
2021-10-09 23:43:39.525359 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:40.957774 I | auth: deleting token LxrTHtkeQrHeCBEX.521 for user conductor
2021-10-09 23:43:42.830906 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (376.054241ms) to execute
2021-10-09 23:43:43.957782 I | auth: deleting token mxkYmcbIzbluVpAc.522 for user conductor
2021-10-09 23:43:44.525601 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:47.957802 I | auth: deleting token OYdguVxJSypKJwdS.525 for user conductor
2021-10-09 23:43:49.023114 I | auth: deleting token VrVUMpKPGeHmegbV.524 for user conductor
2021-10-09 23:43:49.525951 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:50.023165 I | auth: deleting token kAQOMRZsOKDxjDEC.528 for user conductor
2021-10-09 23:43:50.023225 I | auth: deleting token fJwQbIxRrlXVOScd.526 for user conductor
2021-10-09 23:43:50.023237 I | auth: deleting token ZSdOxgpnjjIwZRNz.527 for user conductor
2021-10-09 23:43:52.957800 I | auth: deleting token eMUeeHrCMdkVjmqI.530 for user conductor
2021-10-09 23:43:54.526252 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:55.023209 I | auth: deleting token XhSkjagcAoHRVfkx.532 for user conductor
2021-10-09 23:43:55.231572 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (8.00214498s) to execute
2021-10-09 23:43:55.454592 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.117145ms) to execute
2021-10-09 23:43:55.454847 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.380878ms) to execute
2021-10-09 23:43:55.554917 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (131.372749ms) to execute
2021-10-09 23:43:56.023190 I | auth: deleting token gKhLviEfSFrZmrwa.533 for user conductor
2021-10-09 23:43:56.023262 I | auth: deleting token npgIWxJYivVgoClD.531 for user conductor
2021-10-09 23:43:57.957760 I | auth: deleting token CHpVwzrJzDPKUTns.534 for user conductor
2021-10-09 23:43:57.957804 I | auth: deleting token CmDoJfCZdLtwHlxZ.535 for user conductor
2021-10-09 23:43:59.432009 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.408412095s) to execute
2021-10-09 23:43:59.526469 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:43:59.655132 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.710729ms) to execute
2021-10-09 23:44:01.957729 I | auth: deleting token FRlRIsvrBQRoLPyn.536 for user conductor
2021-10-09 23:44:01.957786 I | auth: deleting token lJfjPNOrYEtzlctL.537 for user conductor
2021-10-09 23:44:03.957745 I | auth: deleting token HpgpMMgRStzySGxc.538 for user conductor
2021-10-09 23:44:04.526860 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:04.957777 I | auth: deleting token BflNRUQbgwNAjiTY.539 for user conductor
2021-10-09 23:44:04.957894 I | auth: deleting token DhCDXJKCvxVuPQnK.540 for user conductor
2021-10-09 23:44:07.957751 I | auth: deleting token mIGXWCaeoOGOAYdA.541 for user conductor
2021-10-09 23:44:09.224995 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.069991743s) to execute
2021-10-09 23:44:09.527292 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:09.957809 I | auth: deleting token zoRLarcHXHarzGxm.543 for user conductor
2021-10-09 23:44:09.957872 I | auth: deleting token QOuuQAfriXGYKZpU.542 for user conductor
2021-10-09 23:44:09.957887 I | auth: deleting token nQnzOTstSJKjmNlD.544 for user conductor
2021-10-09 23:44:11.230677 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (407.216776ms) to execute
2021-10-09 23:44:11.957936 I | auth: deleting token gKkmlZFAYvjMIzVm.545 for user conductor
2021-10-09 23:44:11.958017 I | auth: deleting token cJFtaNwsLPekTcWz.546 for user conductor
2021-10-09 23:44:13.324609 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.901117406s) to execute
2021-10-09 23:44:13.554538 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.196206ms) to execute
2021-10-09 23:44:14.527580 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:14.957704 I | auth: deleting token JMiSOQlFCaRNybqh.547 for user conductor
2021-10-09 23:44:16.224226 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (369.493873ms) to execute
2021-10-09 23:44:16.957787 I | auth: deleting token XIeWqcgeHfLARaVj.548 for user conductor
2021-10-09 23:44:16.957840 I | auth: deleting token GhbxAYmTkrjDMQyK.549 for user conductor
2021-10-09 23:44:19.527827 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:19.957838 I | auth: deleting token tQUnYFeNEJXLYdkC.550 for user conductor
2021-10-09 23:44:19.957902 I | auth: deleting token nIxBvSpzxlwfuOvj.551 for user conductor
2021-10-09 23:44:23.023149 I | auth: deleting token GEqueidfdjWwBwFL.553 for user conductor
2021-10-09 23:44:23.023217 I | auth: deleting token dlRcEAgpVNXinJIt.552 for user conductor
2021-10-09 23:44:24.528231 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:24.732525 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (877.882625ms) to execute
2021-10-09 23:44:24.957744 I | auth: deleting token PwymytxnpudXSFzm.554 for user conductor
2021-10-09 23:44:24.957798 I | auth: deleting token HzZqLtiTgdyuvIZA.555 for user conductor
2021-10-09 23:44:27.957892 I | auth: deleting token JdfaSaUanIxiCTdq.557 for user conductor
2021-10-09 23:44:27.957959 I | auth: deleting token WafFCugzInEnqLsq.556 for user conductor
2021-10-09 23:44:29.425636 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.870532458s) to execute
2021-10-09 23:44:29.528633 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:30.023242 I | auth: deleting token jufxPIIpvUhZQMRx.558 for user conductor
2021-10-09 23:44:30.957855 I | auth: deleting token veZsWenJMHpZjdwk.559 for user conductor
2021-10-09 23:44:31.325964 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.801551943s) to execute
2021-10-09 23:44:31.454897 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (126.348335ms) to execute
2021-10-09 23:44:33.823862 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.366359837s) to execute
2021-10-09 23:44:34.528975 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:44:35.930076 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.775526745s) to execute
2021-10-09 23:44:38.627834 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.573167415s) to execute
2021-10-09 23:44:39.623211 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:44:39.957762 I | auth: deleting token IpIzhMOIQtavjRRO.560 for user conductor
2021-10-09 23:44:40.531106 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.80768314s) to execute
2021-10-09 23:44:40.531278 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.807735138s) to execute
2021-10-09 23:44:40.957720 I | auth: deleting token PeEbFwGZvSiarsgV.562 for user conductor
2021-10-09 23:44:40.957779 I | auth: deleting token FDZBDxQPfHZBmemk.561 for user conductor
2021-10-09 23:44:40.957794 I | auth: deleting token pZfwDwnWcGfgAhdG.564 for user conductor
2021-10-09 23:44:40.957809 I | auth: deleting token suZSYHvOdzsZsKKp.563 for user conductor
2021-10-09 23:44:42.731510 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.105589463s) to execute
2021-10-09 23:44:42.732018 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.108589742s) to execute
2021-10-09 23:44:44.623528 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:44:47.023134 I | auth: deleting token zzGEISURxhZhGtAX.565 for user conductor
2021-10-09 23:44:47.023192 I | auth: deleting token GjEauWERBgLgPcpM.570 for user conductor
2021-10-09 23:44:47.023211 I | auth: deleting token aBalHvdgWgsIkVmX.569 for user conductor
2021-10-09 23:44:47.023221 I | auth: deleting token nuhkbXeaLmyNPsAI.567 for user conductor
2021-10-09 23:44:47.023241 I | auth: deleting token jHkTCknWRDotcMGP.566 for user conductor
2021-10-09 23:44:47.323684 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.50021488s) to execute
2021-10-09 23:44:47.323987 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.397768298s) to execute
2021-10-09 23:44:47.324623 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.566448393s) to execute
2021-10-09 23:44:48.957794 I | auth: deleting token ApJTCTNiZxNfzBca.571 for user conductor
2021-10-09 23:44:49.423448 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.000018064s) to execute
2021-10-09 23:44:49.423691 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096023875s) to execute
2021-10-09 23:44:49.623809 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:44:50.957796 I | auth: deleting token NBCEKLEOtruBfYRV.575 for user conductor
2021-10-09 23:44:50.957850 I | auth: deleting token SdIHxDvdqUQRWnoj.572 for user conductor
2021-10-09 23:44:50.957864 I | auth: deleting token sWIKMjyviimPEyYU.573 for user conductor
2021-10-09 23:44:51.528132 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.973127031s) to execute
2021-10-09 23:44:53.529363 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.102715023s) to execute
2021-10-09 23:44:53.529722 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.806306913s) to execute
2021-10-09 23:44:53.529873 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.906460002s) to execute
2021-10-09 23:44:53.823523 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (100.00428ms) to execute
2021-10-09 23:44:54.624226 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:44:55.023058 I | auth: deleting token bzXdDcTzAhJmfgXz.577 for user conductor
2021-10-09 23:44:55.023122 I | auth: deleting token WXYMBLMIoMSpZyHH.576 for user conductor
2021-10-09 23:44:56.957730 I | auth: deleting token kMtCdJHwIhTinQOc.580 for user conductor
2021-10-09 23:44:56.957780 I | auth: deleting token SSxfIPdDFbSfeKXT.578 for user conductor
2021-10-09 23:44:56.957788 I | auth: deleting token XBWoGmJTIUNKWqbT.579 for user conductor
2021-10-09 23:44:59.624856 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:00.128603 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.102658929s) to execute
2021-10-09 23:45:01.023105 I | auth: deleting token OBQdOiXKAultUtjm.581 for user conductor
2021-10-09 23:45:01.931377 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.576639325s) to execute
2021-10-09 23:45:01.931490 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.706484668s) to execute
2021-10-09 23:45:01.931675 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.608130715s) to execute
2021-10-09 23:45:02.054877 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (120.851376ms) to execute
2021-10-09 23:45:03.023053 I | auth: deleting token FNQgICWIycnNJmCg.583 for user conductor
2021-10-09 23:45:03.023114 I | auth: deleting token amKpomywtdvmQSbL.585 for user conductor
2021-10-09 23:45:03.023125 I | auth: deleting token jpIZbUVhoeSETEeq.582 for user conductor
2021-10-09 23:45:03.023139 I | auth: deleting token ZdGhIHmSvsqFmkvc.584 for user conductor
2021-10-09 23:45:04.124737 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.001364177s) to execute
2021-10-09 23:45:04.723294 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:04.957842 I | auth: deleting token oOMkyyqPHKjWlBzc.587 for user conductor
2021-10-09 23:45:04.957947 I | auth: deleting token eAgqvSjKcmDYSXiK.586 for user conductor
2021-10-09 23:45:06.328787 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.305113462s) to execute
2021-10-09 23:45:07.023254 I | auth: deleting token EAPIcaMVrNHXoukI.588 for user conductor
2021-10-09 23:45:08.525172 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.901253803s) to execute
2021-10-09 23:45:08.525358 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.101801969s) to execute
2021-10-09 23:45:08.957752 I | auth: deleting token cFuNqIcfdpMWggRG.589 for user conductor
2021-10-09 23:45:09.723586 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:11.023098 I | auth: deleting token RfjJKVsmHFVZyhlj.590 for user conductor
2021-10-09 23:45:11.023154 I | auth: deleting token slLtvVrsTrmzYCvc.591 for user conductor
2021-10-09 23:45:12.426424 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.802923201s) to execute
2021-10-09 23:45:12.426556 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.899047538s) to execute
2021-10-09 23:45:12.554911 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.883548ms) to execute
2021-10-09 23:45:12.655633 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (226.017744ms) to execute
2021-10-09 23:45:12.754557 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.741414ms) to execute
2021-10-09 23:45:12.957808 I | auth: deleting token cgUAHyPlGuHhSvTw.593 for user conductor
2021-10-09 23:45:12.957874 I | auth: deleting token fmDyeFIsUbAMnkbZ.592 for user conductor
2021-10-09 23:45:14.723846 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:17.023037 I | auth: deleting token AunczJYoaEdGvaNC.594 for user conductor
2021-10-09 23:45:19.623915 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.268070223s) to execute
2021-10-09 23:45:19.724259 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:22.957801 I | auth: deleting token MWtPVqqlVDRkyoRZ.595 for user conductor
2021-10-09 23:45:22.957889 I | auth: deleting token bwMvyrIaVpAfpDue.599 for user conductor
2021-10-09 23:45:22.957904 I | auth: deleting token WVftHfzRYnLxQyIg.596 for user conductor
2021-10-09 23:45:22.957917 I | auth: deleting token SJtJvdznpcGlsUCY.597 for user conductor
2021-10-09 23:45:22.957925 I | auth: deleting token AIRTIudLKIUHVySU.598 for user conductor
2021-10-09 23:45:23.727195 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.903848603s) to execute
2021-10-09 23:45:23.854939 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.337924ms) to execute
2021-10-09 23:45:24.724608 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:24.957745 I | auth: deleting token YCwEbkoppTyVdQfS.600 for user conductor
2021-10-09 23:45:26.957774 I | auth: deleting token lATYofcaQgBuOucB.601 for user conductor
2021-10-09 23:45:27.957765 I | auth: deleting token TOWqXzuIpoVLOzSs.604 for user conductor
2021-10-09 23:45:27.957841 I | auth: deleting token JOStJxrPAlDTSTUb.602 for user conductor
2021-10-09 23:45:27.957854 I | auth: deleting token FcKgjaIYnJTaDRxG.603 for user conductor
2021-10-09 23:45:28.826317 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.302824006s) to execute
2021-10-09 23:45:29.724945 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:31.957720 I | auth: deleting token shcbzWNdGpfjumom.607 for user conductor
2021-10-09 23:45:31.957767 I | auth: deleting token khipCPiRDRfsyHoD.606 for user conductor
2021-10-09 23:45:31.957776 I | auth: deleting token LJVeABDoUsgdDciX.605 for user conductor
2021-10-09 23:45:34.430696 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (874.082454ms) to execute
2021-10-09 23:45:34.725193 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:36.023085 I | auth: deleting token YyqDwKBmfpVlPVXA.609 for user conductor
2021-10-09 23:45:36.023144 I | auth: deleting token KTBdhIqUhTudSUuo.608 for user conductor
2021-10-09 23:45:36.023159 I | auth: deleting token zBjIeprkTpTuouCb.610 for user conductor
2021-10-09 23:45:36.525062 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.87026095s) to execute
2021-10-09 23:45:37.957765 I | auth: deleting token vVWcpexsFwKgbcZK.612 for user conductor
2021-10-09 23:45:37.957836 I | auth: deleting token xjKKXHACrNgeEHXT.611 for user conductor
2021-10-09 23:45:38.830940 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.274011058s) to execute
2021-10-09 23:45:39.023254 I | auth: deleting token dLZpqZrsjFNmCkgW.613 for user conductor
2021-10-09 23:45:39.725447 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:41.023104 I | auth: deleting token RTItJAPpdqmCcdWT.614 for user conductor
2021-10-09 23:45:41.123950 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.596196365s) to execute
2021-10-09 23:45:43.123977 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.999988625s) to execute
2021-10-09 23:45:43.124433 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.199058983s) to execute
2021-10-09 23:45:43.354767 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.311993ms) to execute
2021-10-09 23:45:43.554720 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (331.192625ms) to execute
2021-10-09 23:45:43.554761 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (297.378455ms) to execute
2021-10-09 23:45:44.725840 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:45.023087 I | auth: deleting token dHBujjlwbbohVfHk.616 for user conductor
2021-10-09 23:45:45.823490 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (599.924973ms) to execute
2021-10-09 23:45:47.023131 I | auth: deleting token dwSwzoeMrttwWZUv.615 for user conductor
2021-10-09 23:45:47.023197 I | auth: deleting token JbGhFvdYiWjsjxsB.617 for user conductor
2021-10-09 23:45:47.023246 I | auth: deleting token VfVqUymVGAOSqZGd.618 for user conductor
2021-10-09 23:45:47.923526 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.90001958s) to execute
2021-10-09 23:45:47.957772 I | auth: deleting token vqpJOBvjaehvWUAU.619 for user conductor
2021-10-09 23:45:48.054717 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.479719ms) to execute
2021-10-09 23:45:49.726125 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:52.624806 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.500944529s) to execute
2021-10-09 23:45:54.023194 I | auth: deleting token apCBUMlhnxpwBpkW.624 for user conductor
2021-10-09 23:45:54.023247 I | auth: deleting token sWLHrenGsZsQdvNC.622 for user conductor
2021-10-09 23:45:54.023272 I | auth: deleting token izAHfzwUFuBjYqSu.623 for user conductor
2021-10-09 23:45:54.023278 I | auth: deleting token oAPiLjpjzALPnroT.620 for user conductor
2021-10-09 23:45:54.023287 I | auth: deleting token EEyuhojPFPBpvESw.621 for user conductor
2021-10-09 23:45:54.726569 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:45:54.828495 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (572.908204ms) to execute
2021-10-09 23:45:55.957685 I | auth: deleting token tsDRDIngJmzWnmYW.625 for user conductor
2021-10-09 23:45:57.957719 I | auth: deleting token wWDBLFoKFCXGKzhp.626 for user conductor
2021-10-09 23:45:59.126438 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.068543632s) to execute
2021-10-09 23:45:59.254907 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.501885ms) to execute
2021-10-09 23:45:59.257279 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.367098ms) to execute
2021-10-09 23:45:59.726907 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:00.957773 I | auth: deleting token dKTZlaGsibEJbNsT.627 for user conductor
2021-10-09 23:46:03.426223 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.471747289s) to execute
2021-10-09 23:46:04.727268 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:04.957825 I | auth: deleting token SAuQDgBdkQllRSbL.628 for user conductor
2021-10-09 23:46:05.526122 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.971405681s) to execute
2021-10-09 23:46:07.023362 I | auth: deleting token VIaVytTyrHuCRCSB.629 for user conductor
2021-10-09 23:46:07.429562 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.774961724s) to execute
2021-10-09 23:46:09.023167 I | auth: deleting token RsIlwAVaUAfGYeUT.631 for user conductor
2021-10-09 23:46:09.023230 I | auth: deleting token jrxMAPovSRKlxVBw.634 for user conductor
2021-10-09 23:46:09.023240 I | auth: deleting token psRcVWZedoQMMnbR.633 for user conductor
2021-10-09 23:46:09.023248 I | auth: deleting token GneWyEPUCCHZDNpO.630 for user conductor
2021-10-09 23:46:09.624089 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.095777036s) to execute
2021-10-09 23:46:09.624238 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.999070911s) to execute
2021-10-09 23:46:09.624403 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.100846692s) to execute
2021-10-09 23:46:09.727632 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:09.755094 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.153869ms) to execute
2021-10-09 23:46:10.957754 I | auth: deleting token GlbcuCCWSrgFzvlt.635 for user conductor
2021-10-09 23:46:11.824468 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.06682328s) to execute
2021-10-09 23:46:11.824586 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.201015635s) to execute
2021-10-09 23:46:11.957768 I | auth: deleting token LFBDrdFuKpczWzGK.637 for user conductor
2021-10-09 23:46:14.126722 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.1701974s) to execute
2021-10-09 23:46:14.126934 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (972.432663ms) to execute
2021-10-09 23:46:14.727924 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:14.957803 I | auth: deleting token MPpVugFBbJDBQiwl.638 for user conductor
2021-10-09 23:46:14.957918 I | auth: deleting token QHzQPjVoVlHiojxm.639 for user conductor
2021-10-09 23:46:16.223215 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.96853261s) to execute
2021-10-09 23:46:16.359144 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (132.841774ms) to execute
2021-10-09 23:46:16.957726 I | auth: deleting token RsylwloAaCwZapWP.640 for user conductor
2021-10-09 23:46:18.623170 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.799711464s) to execute
2021-10-09 23:46:18.957726 I | auth: deleting token AFsrliJjcjDMSBRb.641 for user conductor
2021-10-09 23:46:19.728136 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:22.523568 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.768886511s) to execute
2021-10-09 23:46:22.654952 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.305395ms) to execute
2021-10-09 23:46:22.756578 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (229.4716ms) to execute
2021-10-09 23:46:22.854696 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (198.182166ms) to execute
2021-10-09 23:46:22.957832 I | auth: deleting token MaejzqWoYDCrfNfX.642 for user conductor
2021-10-09 23:46:24.823195 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:25.927666 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (873.027812ms) to execute
2021-10-09 23:46:26.957808 I | auth: deleting token maqvbQMMmkFkNwIk.643 for user conductor
2021-10-09 23:46:26.957866 I | auth: deleting token dhWUZHPTuBMXWJqF.646 for user conductor
2021-10-09 23:46:26.957876 I | auth: deleting token sOCikPsEmiLvccKG.647 for user conductor
2021-10-09 23:46:26.957889 I | auth: deleting token ihTCQslLWgrravoN.644 for user conductor
2021-10-09 23:46:26.957903 I | auth: deleting token lEYjQTlZoNcmVmFa.645 for user conductor
2021-10-09 23:46:28.324144 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (265.615208ms) to execute
2021-10-09 23:46:29.823545 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:29.957831 I | auth: deleting token uQCmYZmOKfaUcGNj.648 for user conductor
2021-10-09 23:46:29.957893 I | auth: deleting token ZSXqvvqdUXnhrzka.649 for user conductor
2021-10-09 23:46:32.957854 I | auth: deleting token gbrkaoCMqmhZbFpL.651 for user conductor
2021-10-09 23:46:32.957919 I | auth: deleting token hkhzTTnNfwPwQrQW.650 for user conductor
2021-10-09 23:46:34.823924 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:34.957676 I | auth: deleting token FDeARtekXiYQpwIf.653 for user conductor
2021-10-09 23:46:34.957715 I | auth: deleting token QbAtvkXOtcjjjSDd.652 for user conductor
2021-10-09 23:46:38.957817 I | auth: deleting token uysInnwZRcXCTxhZ.655 for user conductor
2021-10-09 23:46:39.824269 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:42.931636 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.108225322s) to execute
2021-10-09 23:46:43.023136 I | auth: deleting token gCFyMfLXRtrnESJi.659 for user conductor
2021-10-09 23:46:43.023204 I | auth: deleting token DyeOIDNlcDnWwduM.657 for user conductor
2021-10-09 23:46:43.023222 I | auth: deleting token qgtrGaVYZyiSZmnj.658 for user conductor
2021-10-09 23:46:43.023234 I | auth: deleting token bphypDBwVSlgofZG.656 for user conductor
2021-10-09 23:46:43.023259 I | auth: deleting token uIpioeEgKZaReLeR.654 for user conductor
2021-10-09 23:46:43.155538 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.287593ms) to execute
2021-10-09 23:46:43.255901 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (132.529621ms) to execute
2021-10-09 23:46:44.923314 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:45.957744 I | auth: deleting token mfZHivdvOXruULVH.660 for user conductor
2021-10-09 23:46:45.957833 I | auth: deleting token ugLXjmXzyiuAPEmG.662 for user conductor
2021-10-09 23:46:45.957849 I | auth: deleting token OoaSOsBnrdjIQvii.661 for user conductor
2021-10-09 23:46:47.957858 I | auth: deleting token OJIdQNoyaJDfsLfu.664 for user conductor
2021-10-09 23:46:47.957955 I | auth: deleting token cdbnTgCdAkhnRvRF.663 for user conductor
2021-10-09 23:46:49.923687 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:49.957802 I | auth: deleting token UzColoqjWUaBsDkK.665 for user conductor
2021-10-09 23:46:49.957870 I | auth: deleting token ZxFObknomIoQGpJO.666 for user conductor
2021-10-09 23:46:52.957701 I | auth: deleting token XJeiPNpIPlSxauZa.667 for user conductor
2021-10-09 23:46:54.924620 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:46:55.957682 I | auth: deleting token BDvxyeLgTTpKFINp.668 for user conductor
2021-10-09 23:46:57.927051 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (280.492392ms) to execute
2021-10-09 23:46:59.931585 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.876933698s) to execute
2021-10-09 23:46:59.934979 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:02.023037 I | auth: deleting token FweWrOYracTbfOKp.670 for user conductor
2021-10-09 23:47:02.027141 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.768191133s) to execute
2021-10-09 23:47:02.957853 I | auth: deleting token vhSQhWeKKPbmIzsb.669 for user conductor
2021-10-09 23:47:02.957928 I | auth: deleting token jXjNrLmIraVfeDyT.671 for user conductor
2021-10-09 23:47:04.224869 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.07012499s) to execute
2021-10-09 23:47:04.935379 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:04.957811 I | auth: deleting token ycpjhotsSpFysfSQ.673 for user conductor
2021-10-09 23:47:04.957877 I | auth: deleting token YWNLDvDWQTMrkhGh.672 for user conductor
2021-10-09 23:47:05.960454 I | auth: deleting token LleydiPyQLEHQxSM.674 for user conductor
2021-10-09 23:47:09.225393 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (102.002403ms) to execute
2021-10-09 23:47:10.023157 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:11.254618 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.453777ms) to execute
2021-10-09 23:47:15.023581 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:16.023213 I | auth: deleting token srDdPgVFCphxVRVt.675 for user conductor
2021-10-09 23:47:16.425974 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.602320775s) to execute
2021-10-09 23:47:17.957858 I | auth: deleting token PexRjjeHRiIjSFJP.678 for user conductor
2021-10-09 23:47:17.957914 I | auth: deleting token goIoUuWSNEBlbVFG.680 for user conductor
2021-10-09 23:47:17.957926 I | auth: deleting token GLkAYgOxFLVpMwWu.677 for user conductor
2021-10-09 23:47:17.957932 I | auth: deleting token XiekOPrsCUjBgVxA.676 for user conductor
2021-10-09 23:47:17.957939 I | auth: deleting token oxDluUKUihvSKyEz.679 for user conductor
2021-10-09 23:47:18.630668 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.9072715s) to execute
2021-10-09 23:47:20.023969 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:20.823824 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (500.591181ms) to execute
2021-10-09 23:47:24.023078 I | auth: deleting token rhtKYPfHHgJqRNES.683 for user conductor
2021-10-09 23:47:24.023126 I | auth: deleting token CNSMqVkgpwWiLkzH.682 for user conductor
2021-10-09 23:47:24.023134 I | auth: deleting token jUXBTXyMEtZJqSYc.686 for user conductor
2021-10-09 23:47:24.023146 I | auth: deleting token QTEPsoADFCxdikcW.685 for user conductor
2021-10-09 23:47:24.023153 I | auth: deleting token WtXOmvICVTbRnaet.684 for user conductor
2021-10-09 23:47:25.024333 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:27.023146 I | auth: deleting token lzzPZfRtzMtqucAk.687 for user conductor
2021-10-09 23:47:27.023424 I | auth: deleting token aazXKlpRPkFAFPtX.688 for user conductor
2021-10-09 23:47:27.128726 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.271983413s) to execute
2021-10-09 23:47:29.022956 I | auth: deleting token NZkzJVKCnShltaIv.689 for user conductor
2021-10-09 23:47:29.130649 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.775903019s) to execute
2021-10-09 23:47:29.354926 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.42279ms) to execute
2021-10-09 23:47:29.957840 I | auth: deleting token TQVRFJXWDTBmKuuh.690 for user conductor
2021-10-09 23:47:30.024637 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:31.957812 I | auth: deleting token NwUlGdWfgLbOYUeh.691 for user conductor
2021-10-09 23:47:34.957778 I | auth: deleting token zFnrCLwdVWLyILhT.692 for user conductor
2021-10-09 23:47:35.024851 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:38.957743 I | auth: deleting token DhRmabvDPXMZMuqm.695 for user conductor
2021-10-09 23:47:38.957789 I | auth: deleting token GrQSZJPipJveiTix.694 for user conductor
2021-10-09 23:47:38.957799 I | auth: deleting token aAgDLrIFMfFYuynd.693 for user conductor
2021-10-09 23:47:39.957749 I | auth: deleting token rSKTVDaWDONrVYkV.696 for user conductor
2021-10-09 23:47:40.025095 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:40.254778 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (131.358253ms) to execute
2021-10-09 23:47:42.957754 I | auth: deleting token lypUeFnXnppiBCrp.698 for user conductor
2021-10-09 23:47:44.023112 I | auth: deleting token AtjmOyaqcMXFmgwG.699 for user conductor
2021-10-09 23:47:44.023191 I | auth: deleting token mlTAAfuJNuCnvuch.697 for user conductor
2021-10-09 23:47:44.229624 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.172877044s) to execute
2021-10-09 23:47:45.025334 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:46.023130 I | auth: deleting token pAijOqXWnOYyRfKX.700 for user conductor
2021-10-09 23:47:46.023191 I | auth: deleting token HbzENqrXGPgRcykM.701 for user conductor
2021-10-09 23:47:46.529343 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.203515982s) to execute
2021-10-09 23:47:46.529524 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.206120668s) to execute
2021-10-09 23:47:47.957870 I | auth: deleting token nCUjCLVQAkIrptEI.702 for user conductor
2021-10-09 23:47:47.957949 I | auth: deleting token eYEGTOErnNfAnjsW.703 for user conductor
2021-10-09 23:47:48.625117 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.801852271s) to execute
2021-10-09 23:47:48.625323 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.901878929s) to execute
2021-10-09 23:47:48.754793 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (126.662692ms) to execute
2021-10-09 23:47:49.957780 I | auth: deleting token hzDtgOrIBcuHTAaP.704 for user conductor
2021-10-09 23:47:50.025638 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-09 23:47:50.554630 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.513878ms) to execute
2021-10-09 23:47:54.324634 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (868.023023ms) to execute
2021-10-09 23:47:55.025875 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:47:58.023320 I | auth: deleting token ADeXFrnszmxPjHiW.706 for user conductor
2021-10-09 23:47:58.023392 I | auth: deleting token ZGLmdTWXtbQtrNOz.708 for user conductor
2021-10-09 23:47:59.957844 I | auth: deleting token gZSEZSCsRjjAyIEy.710 for user conductor
2021-10-09 23:47:59.957899 I | auth: deleting token lwoVdTxjLWFYtDRO.709 for user conductor
2021-10-09 23:47:59.957913 I | auth: deleting token duAbVAdGqhIksRKO.711 for user conductor
2021-10-09 23:47:59.957923 I | auth: deleting token ebnKVIJLjNvoQaUU.707 for user conductor
2021-10-09 23:47:59.957934 I | auth: deleting token nlVpTyYiTgeMDNrg.705 for user conductor
2021-10-09 23:48:00.123478 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:05.023203 I | auth: deleting token BFjLhATjPZdSivuF.712 for user conductor
2021-10-09 23:48:05.023267 I | auth: deleting token aVdGbLrkJksUAFGS.715 for user conductor
2021-10-09 23:48:05.023284 I | auth: deleting token bEziuvHuvVaQPRpA.713 for user conductor
2021-10-09 23:48:05.023299 I | auth: deleting token rPfMtOTztGtFmKVo.714 for user conductor
2021-10-09 23:48:05.123768 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:05.128168 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.873268863s) to execute
2021-10-09 23:48:07.031347 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.808005219s) to execute
2021-10-09 23:48:07.031727 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.508249683s) to execute
2021-10-09 23:48:07.156014 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (122.030106ms) to execute
2021-10-09 23:48:08.957763 I | auth: deleting token EaYckIDCjuABkvJs.717 for user conductor
2021-10-09 23:48:10.124245 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:11.023071 I | auth: deleting token KqjEOjjkNkbAejZd.716 for user conductor
2021-10-09 23:48:11.023134 I | auth: deleting token QKoZLEoaWjHSvUZt.719 for user conductor
2021-10-09 23:48:11.023155 I | auth: deleting token IoJsnYxDnxsuVRRw.718 for user conductor
2021-10-09 23:48:12.957715 I | auth: deleting token uNgwLTvnJjEGHflD.721 for user conductor
2021-10-09 23:48:12.957778 I | auth: deleting token fNZHtJJFeYudlNkb.720 for user conductor
2021-10-09 23:48:13.025362 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.871063738s) to execute
2021-10-09 23:48:13.155399 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.514082ms) to execute
2021-10-09 23:48:13.157354 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.168087ms) to execute
2021-10-09 23:48:13.157504 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (100.383466ms) to execute
2021-10-09 23:48:14.023070 I | auth: deleting token LTMrCrYysCfQEldf.722 for user conductor
2021-10-09 23:48:15.124569 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:16.957714 I | auth: deleting token cqCZmnQbRNwfBUYM.723 for user conductor
2021-10-09 23:48:17.326078 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.002520429s) to execute
2021-10-09 23:48:19.023104 I | auth: deleting token fOLwhirhjcPTASvh.724 for user conductor
2021-10-09 23:48:19.427945 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.004380545s) to execute
2021-10-09 23:48:19.428220 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.970579395s) to execute
2021-10-09 23:48:19.428325 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.404964753s) to execute
2021-10-09 23:48:20.124847 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:21.624174 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.069660628s) to execute
2021-10-09 23:48:21.957766 I | auth: deleting token hHomUzPWZmZEdxIe.725 for user conductor
2021-10-09 23:48:23.828185 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.201377787s) to execute
2021-10-09 23:48:23.923573 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.266246138s) to execute
2021-10-09 23:48:25.125131 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:25.957857 I | auth: deleting token eVeXNcNlrLxQvxGa.728 for user conductor
2021-10-09 23:48:25.957932 I | auth: deleting token VEukRDdpaLyqSrBL.727 for user conductor
2021-10-09 23:48:25.957961 I | auth: deleting token jjtljngWqkOQKyOd.726 for user conductor
2021-10-09 23:48:28.028269 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (4.101935621s) to execute
2021-10-09 23:48:28.028727 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.101512722s) to execute
2021-10-09 23:48:28.028982 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.904263122s) to execute
2021-10-09 23:48:28.957770 I | auth: deleting token UMUIzmKWsjOIbRfh.729 for user conductor
2021-10-09 23:48:30.125373 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:30.957764 I | auth: deleting token rfZqsWLwfZsoeaiW.730 for user conductor
2021-10-09 23:48:30.957829 I | auth: deleting token RHxdcGkbCpXcexrL.732 for user conductor
2021-10-09 23:48:30.957846 I | auth: deleting token gRkxkyNeqzrkSTWv.731 for user conductor
2021-10-09 23:48:32.332016 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.174954113s) to execute
2021-10-09 23:48:34.326739 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (5.072312132s) to execute
2021-10-09 23:48:34.957695 I | auth: deleting token eomzMyvOgvrmKJoU.733 for user conductor
2021-10-09 23:48:34.957745 I | auth: deleting token awviCMKvyzBIdAQe.734 for user conductor
2021-10-09 23:48:34.957758 I | auth: deleting token ZzmIXuGfioOmoYYg.735 for user conductor
2021-10-09 23:48:35.125652 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:36.325975 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.802518563s) to execute
2021-10-09 23:48:36.326128 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.882483704s) to execute
2021-10-09 23:48:36.326267 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.882399401s) to execute
2021-10-09 23:48:37.023228 I | auth: deleting token ZIXeosXHizfjtnaf.736 for user conductor
2021-10-09 23:48:38.428610 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.003283365s) to execute
2021-10-09 23:48:38.429020 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.101354961s) to execute
2021-10-09 23:48:38.656981 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (133.43615ms) to execute
2021-10-09 23:48:38.756742 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (199.021795ms) to execute
2021-10-09 23:48:38.957765 I | auth: deleting token NDVGOSNAmAZnwVDa.737 for user conductor
2021-10-09 23:48:38.957856 I | auth: deleting token LArCRcXcSLJWiJbh.738 for user conductor
2021-10-09 23:48:38.957881 I | auth: deleting token vvZnHafRBMpEiBCr.739 for user conductor
2021-10-09 23:48:40.125947 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:40.957813 I | auth: deleting token tgRMCJytrlqeKRLN.740 for user conductor
2021-10-09 23:48:42.957747 I | auth: deleting token cKJhNGxrEGTDOWLt.741 for user conductor
2021-10-09 23:48:42.957800 I | auth: deleting token pDArgOOjmIClxruM.742 for user conductor
2021-10-09 23:48:45.126325 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:45.957941 I | auth: deleting token TkCwHYNFkWpnnggH.743 for user conductor
2021-10-09 23:48:45.957998 I | auth: deleting token NtXakGwYZOYjptLe.744 for user conductor
2021-10-09 23:48:50.126595 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:55.131489 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.876815762s) to execute
2021-10-09 23:48:55.323328 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:48:56.023106 I | auth: deleting token IAwPkcqRpBWtWWiU.746 for user conductor
2021-10-09 23:48:56.023176 I | auth: deleting token iyEPqPoDPSFRWpmp.749 for user conductor
2021-10-09 23:48:56.023197 I | auth: deleting token gnLEPELxDfizaEWI.745 for user conductor
2021-10-09 23:48:56.023216 I | auth: deleting token eHTZXLLEJEvFYLpr.748 for user conductor
2021-10-09 23:48:56.023236 I | auth: deleting token cfDHGsEYCHJrzcBm.747 for user conductor
2021-10-09 23:48:57.026633 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.803215561s) to execute
2021-10-09 23:48:57.026880 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.772436508s) to execute
2021-10-09 23:48:59.231665 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.106321421s) to execute
2021-10-09 23:48:59.231852 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.201373915s) to execute
2021-10-09 23:48:59.957773 I | auth: deleting token ToPDHTxLLCtBGFZe.751 for user conductor
2021-10-09 23:48:59.957835 I | auth: deleting token qNFMPpFDvdNqOjAC.753 for user conductor
2021-10-09 23:48:59.957847 I | auth: deleting token qVuhlNshUtliXMZO.752 for user conductor
2021-10-09 23:48:59.957860 I | auth: deleting token ODvaEWwLbZJETReU.750 for user conductor
2021-10-09 23:49:00.323610 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:02.023161 I | auth: deleting token ftlubGdPxsLuVKvt.755 for user conductor
2021-10-09 23:49:02.957762 I | auth: deleting token DCriYWGYpKBUQwHX.756 for user conductor
2021-10-09 23:49:05.323455 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.99999161s) to execute
2021-10-09 23:49:05.323851 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:05.323999 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.995105581s) to execute
2021-10-09 23:49:05.324070 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.597390961s) to execute
2021-10-09 23:49:05.957679 I | auth: deleting token yJqdLdUpQuIuxMWV.757 for user conductor
2021-10-09 23:49:07.429042 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.102239326s) to execute
2021-10-09 23:49:09.224770 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.797787857s) to execute
2021-10-09 23:49:09.957860 I | auth: deleting token oqyWDpzWhQdiXaiU.759 for user conductor
2021-10-09 23:49:09.957918 I | auth: deleting token HAEivsfvqFmulwGT.758 for user conductor
2021-10-09 23:49:10.324304 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:11.229727 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.779509183s) to execute
2021-10-09 23:49:11.957837 I | auth: deleting token lqJeMNgrOgutjlWg.760 for user conductor
2021-10-09 23:49:13.325905 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.002478514s) to execute
2021-10-09 23:49:13.325971 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.899508053s) to execute
2021-10-09 23:49:13.326065 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.002572735s) to execute
2021-10-09 23:49:13.957836 I | auth: deleting token BbBvpvGRmcHKFhuK.764 for user conductor
2021-10-09 23:49:13.957911 I | auth: deleting token HShOUHHBplCvhQzQ.762 for user conductor
2021-10-09 23:49:13.957927 I | auth: deleting token JMnDWAcdOgtGBxKX.763 for user conductor
2021-10-09 23:49:15.324702 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:15.527778 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.100029522s) to execute
2021-10-09 23:49:15.527882 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (904.439859ms) to execute
2021-10-09 23:49:16.957778 I | auth: deleting token YbvKevZGJMllJson.765 for user conductor
2021-10-09 23:49:16.957839 I | auth: deleting token tTTGNZrlFgHCsSnR.766 for user conductor
2021-10-09 23:49:17.824498 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.169806141s) to execute
2021-10-09 23:49:18.957826 I | auth: deleting token CXNIGHLewwTBqMnW.767 for user conductor
2021-10-09 23:49:20.325007 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:21.425191 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.596656789s) to execute
2021-10-09 23:49:21.425782 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.598790065s) to execute
2021-10-09 23:49:21.957829 I | auth: deleting token HRBKZYNDVgHnoORQ.768 for user conductor
2021-10-09 23:49:23.530290 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.406865789s) to execute
2021-10-09 23:49:25.023110 I | auth: deleting token zjieqtgdEXPtRdKr.770 for user conductor
2021-10-09 23:49:25.023214 I | auth: deleting token KuwdgWauMAHcSZci.769 for user conductor
2021-10-09 23:49:25.325369 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:25.529258 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.80477995s) to execute
2021-10-09 23:49:25.654680 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (122.772455ms) to execute
2021-10-09 23:49:30.023168 I | auth: deleting token hAwUUjIjQZOjcQIT.772 for user conductor
2021-10-09 23:49:30.023215 I | auth: deleting token mOPlFkHeLgvKdbrd.773 for user conductor
2021-10-09 23:49:30.028734 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.674026499s) to execute
2021-10-09 23:49:30.325674 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:31.957792 I | auth: deleting token hnSmwYjSrMSoRABD.776 for user conductor
2021-10-09 23:49:31.957862 I | auth: deleting token nLxXpmbyCBCoGGJJ.777 for user conductor
2021-10-09 23:49:31.957876 I | auth: deleting token rVbPRTZBLuRhfcBa.774 for user conductor
2021-10-09 23:49:32.127539 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (2.072981472s) to execute
2021-10-09 23:49:32.127715 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096927733s) to execute
2021-10-09 23:49:35.325916 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:36.023382 I | auth: deleting token LkKzcsGkAoZxOvwy.778 for user conductor
2021-10-09 23:49:36.023448 I | auth: deleting token VZeBDfzLPzfFkdCo.780 for user conductor
2021-10-09 23:49:36.626122 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (4.402738309s) to execute
2021-10-09 23:49:36.626381 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.496040619s) to execute
2021-10-09 23:49:37.023167 I | auth: deleting token BxsHNCOswpZeBrAj.779 for user conductor
2021-10-09 23:49:39.023167 I | auth: deleting token rLizTFxUUczRWeaA.783 for user conductor
2021-10-09 23:49:40.326214 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:41.023098 I | auth: deleting token cOSlcNrCbdAMnXdu.781 for user conductor
2021-10-09 23:49:42.726634 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.672211201s) to execute
2021-10-09 23:49:42.957768 I | auth: deleting token LqiCdvRVDoXhZsyu.784 for user conductor
2021-10-09 23:49:43.957738 I | auth: deleting token kSUacjXaEIUoTrjW.786 for user conductor
2021-10-09 23:49:43.957805 I | auth: deleting token UrKOLNhknwdOWPUo.785 for user conductor
2021-10-09 23:49:44.524035 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.794879645s) to execute
2021-10-09 23:49:44.524200 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.699724685s) to execute
2021-10-09 23:49:44.524348 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.794743205s) to execute
2021-10-09 23:49:45.326440 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:48.023179 I | auth: deleting token FakLlgjKQBnImSOe.787 for user conductor
2021-10-09 23:49:48.023240 I | auth: deleting token rkdIUQHanAwxuPPM.789 for user conductor
2021-10-09 23:49:48.926931 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (3.803591824s) to execute
2021-10-09 23:49:49.324299 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (395.231889ms) to execute
2021-10-09 23:49:49.957756 I | auth: deleting token DoMbgPEJZtrWLuGD.788 for user conductor
2021-10-09 23:49:50.326729 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:51.426638 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.103390312s) to execute
2021-10-09 23:49:51.957784 I | auth: deleting token YSJacbjgKqiTChhw.790 for user conductor
2021-10-09 23:49:53.130254 W | etcdserver: request "header: authenticate:" with result "size:50" took too long (1.506826258s) to execute
2021-10-09 23:49:54.023136 I | auth: deleting token LeVwjQpRcjhZZCns.791 for user conductor
2021-10-09 23:49:54.023177 I | auth: deleting token pAayZWwelpLWnXZj.792 for user conductor
2021-10-09 23:49:54.023185 I | auth: deleting token GMIxFVmODAigfpiA.793 for user conductor
2021-10-09 23:49:54.023194 I | auth: deleting token FhmlhXvELznIeNPS.794 for user conductor
2021-10-09 23:49:54.930018 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705892149s) to execute
2021-10-09 23:49:54.930414 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.706197357s) to execute
2021-10-09 23:49:55.327244 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:49:57.430515 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.561826139s) to execute
2021-10-09 23:49:59.626199 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.071547991s) to execute
2021-10-09 23:50:00.327490 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:01.023035 I | auth: deleting token jDIXJilfjYuxKdiy.796 for user conductor
2021-10-09 23:50:01.023104 I | auth: deleting token TxzfqQFIsuWywsbw.798 for user conductor
2021-10-09 23:50:01.023115 I | auth: deleting token cmOuoTvWKqDcNIsX.795 for user conductor
2021-10-09 23:50:02.023106 I | auth: deleting token zHqRbjluZppLdFVQ.797 for user conductor
2021-10-09 23:50:03.023325 I | auth: deleting token VSVnUXAQpZMMJalo.800 for user conductor
2021-10-09 23:50:03.023435 I | auth: deleting token QmKEFkEGpebXeNYA.799 for user conductor
2021-10-09 23:50:05.327844 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:05.625671 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.899659362s) to execute
2021-10-09 23:50:05.625961 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.902670356s) to execute
2021-10-09 23:50:05.754537 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (122.692089ms) to execute
2021-10-09 23:50:06.957754 I | auth: deleting token KJDCjvtfjFdxqxBo.801 for user conductor
2021-10-09 23:50:06.957807 I | auth: deleting token NwmJuRSZDwtiqILH.802 for user conductor
2021-10-09 23:50:08.957778 I | auth: deleting token OmmDkPmJqzsPnSnO.804 for user conductor
2021-10-09 23:50:09.826159 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800203484s) to execute
2021-10-09 23:50:09.954784 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (125.875547ms) to execute
2021-10-09 23:50:10.056148 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (198.44705ms) to execute
2021-10-09 23:50:10.328180 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:13.023165 I | auth: deleting token FKvApTWdzIOUTdSH.805 for user conductor
2021-10-09 23:50:13.023247 I | auth: deleting token REymbrumOvHxmXLA.803 for user conductor
2021-10-09 23:50:13.023262 I | auth: deleting token RlygTkbYDjlezCdA.807 for user conductor
2021-10-09 23:50:13.023271 I | auth: deleting token YykfKzlHPLZCPuwQ.806 for user conductor
2021-10-09 23:50:13.023283 I | auth: deleting token mJKUrLadScnrwBig.808 for user conductor
2021-10-09 23:50:14.126280 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.966983197s) to execute
2021-10-09 23:50:15.423078 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:16.129544 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.995265421s) to execute
2021-10-09 23:50:16.129802 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.997227882s) to execute
2021-10-09 23:50:20.023171 I | auth: deleting token cVBDqTUFOADxgkXf.810 for user conductor
2021-10-09 23:50:20.023237 I | auth: deleting token MdibrZEulBLISluu.809 for user conductor
2021-10-09 23:50:20.023260 I | auth: deleting token jFVwXQkYrJdBMhWl.813 for user conductor
2021-10-09 23:50:20.023274 I | auth: deleting token xRlvUcpUBzWCdTWp.812 for user conductor
2021-10-09 23:50:20.023284 I | auth: deleting token NUZNloNllDzsFWTq.811 for user conductor
2021-10-09 23:50:20.331465 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.106904365s) to execute
2021-10-09 23:50:20.331786 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (4.198413261s) to execute
2021-10-09 23:50:20.423365 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:20.525059 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (190.369454ms) to execute
2021-10-09 23:50:20.527195 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (192.446549ms) to execute
2021-10-09 23:50:23.957853 I | auth: deleting token dCDiZEctXaLKpHTD.814 for user conductor
2021-10-09 23:50:23.957960 I | auth: deleting token gsVGygIOdvZrgczK.816 for user conductor
2021-10-09 23:50:23.957997 I | auth: deleting token KRPAtdfYbgFLNZYM.815 for user conductor
2021-10-09 23:50:24.330270 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.875747416s) to execute
2021-10-09 23:50:24.957697 I | auth: deleting token XiLPkjUTmVfRIRKw.817 for user conductor
2021-10-09 23:50:25.423761 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:26.957689 I | auth: deleting token kCKcpDugNfKMdtpg.818 for user conductor
2021-10-09 23:50:28.124177 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.069917014s) to execute
2021-10-09 23:50:28.957894 I | auth: deleting token slKaVjqiipnclKxH.820 for user conductor
2021-10-09 23:50:28.957974 I | auth: deleting token HrTbLjvdoUkSMIXN.819 for user conductor
2021-10-09 23:50:30.229462 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.570869918s) to execute
2021-10-09 23:50:30.424157 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:30.957746 I | auth: deleting token xbeTgSghDKWNdsQc.821 for user conductor
2021-10-09 23:50:32.330515 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.975802043s) to execute
2021-10-09 23:50:32.957772 I | auth: deleting token GlHUvAxHltijWexk.822 for user conductor
2021-10-09 23:50:34.424455 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.001195497s) to execute
2021-10-09 23:50:34.424772 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.998632911s) to execute
2021-10-09 23:50:35.023284 I | auth: deleting token YFVnZwdEvFkVTjfd.823 for user conductor
2021-10-09 23:50:35.424527 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:36.726026 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002544096s) to execute
2021-10-09 23:50:36.957841 I | auth: deleting token vOekrdPuColmCAdz.825 for user conductor
2021-10-09 23:50:38.957843 I | auth: deleting token XNgmrLMnfwsglCXK.824 for user conductor
2021-10-09 23:50:40.424845 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:42.727159 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.902283784s) to execute
2021-10-09 23:50:44.023309 I | auth: deleting token URlUlvKQQmiUcrqi.829 for user conductor
2021-10-09 23:50:44.023412 I | auth: deleting token QaILmQwwIoIqynbZ.827 for user conductor
2021-10-09 23:50:44.023498 I | auth: deleting token iXwoZypJkvxGKcDQ.826 for user conductor
2021-10-09 23:50:44.023530 I | auth: deleting token gJOHDrQETyGdPKOV.828 for user conductor
2021-10-09 23:50:45.425051 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:46.023209 I | auth: deleting token wbzBaYeVMExLHzLZ.830 for user conductor
2021-10-09 23:50:46.224677 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801005944s) to execute
2021-10-09 23:50:48.130922 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.007490127s) to execute
2021-10-09 23:50:48.957771 I | auth: deleting token QbdFwGsFvumzBmWf.831 for user conductor
2021-10-09 23:50:48.957832 I | auth: deleting token fLEBtodxBnjYMxIF.832 for user conductor
2021-10-09 23:50:48.957845 I | auth: deleting token oIjrOXlRPxJAgMxv.833 for user conductor
2021-10-09 23:50:50.425300 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:50.957835 I | auth: deleting token rEqaEEPSfJCzWadA.834 for user conductor
2021-10-09 23:50:52.957911 I | auth: deleting token RZTCmFlavdGWKtwL.835 for user conductor
2021-10-09 23:50:52.958053 I | auth: deleting token HtRyvRnEprvGcrRY.836 for user conductor
2021-10-09 23:50:54.969003 I | auth: deleting token QdMoHQYTxaZZmTkd.837 for user conductor
2021-10-09 23:50:55.425629 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:50:59.431399 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.97425149s) to execute
2021-10-09 23:50:59.654409 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.01196ms) to execute
2021-10-09 23:51:00.023078 I | auth: deleting token etymURxdHhUGxBtm.841 for user conductor
2021-10-09 23:51:00.023139 I | auth: deleting token ZQJLXwapgnEQlZQE.842 for user conductor
2021-10-09 23:51:00.023154 I | auth: deleting token GCJZOcoLCQrvCSxl.840 for user conductor
2021-10-09 23:51:00.023168 I | auth: deleting token QKuiOZpynUITDASz.838 for user conductor
2021-10-09 23:51:00.023179 I | auth: deleting token lkcMHJbUODapKXSf.839 for user conductor
2021-10-09 23:51:00.425952 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:01.631711 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.20822713s) to execute
2021-10-09 23:51:03.529825 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (471.104571ms) to execute
2021-10-09 23:51:04.023218 I | auth: deleting token zpkDROysUtBfZRrE.843 for user conductor
2021-10-09 23:51:05.426335 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:05.957749 I | auth: deleting token zrlWCYNAmvFtgoby.844 for user conductor
2021-10-09 23:51:05.957819 I | auth: deleting token RXDOhaXAGBecbdtf.845 for user conductor
2021-10-09 23:51:07.957815 I | auth: deleting token PegjzvKFsEmRDGWN.847 for user conductor
2021-10-09 23:51:09.957786 I | auth: deleting token rlctZuspEbtxilJZ.848 for user conductor
2021-10-09 23:51:09.957855 I | auth: deleting token cvOQTGjUbejHcIJb.846 for user conductor
2021-10-09 23:51:09.957868 I | auth: deleting token ArhKpZmDsJEJIPyy.849 for user conductor
2021-10-09 23:51:10.426698 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:12.023164 I | auth: deleting token DGLIkhBtdITnFRFB.850 for user conductor
2021-10-09 23:51:12.023242 I | auth: deleting token cAAWutkcJgdieNnr.851 for user conductor
2021-10-09 23:51:12.223863 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.90038174s) to execute
2021-10-09 23:51:12.355161 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.012202ms) to execute
2021-10-09 23:51:12.455153 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (228.745783ms) to execute
2021-10-09 23:51:12.556588 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (199.546004ms) to execute
2021-10-09 23:51:14.957830 I | auth: deleting token qHMjvHhmGOfFcdEJ.852 for user conductor
2021-10-09 23:51:15.427039 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:16.325581 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.971207925s) to execute
2021-10-09 23:51:16.957681 I | auth: deleting token rhEMsHEfZrfJVUBo.853 for user conductor
2021-10-09 23:51:16.957755 I | auth: deleting token oiqzLNIzvxkeQWPB.854 for user conductor
2021-10-09 23:51:18.424158 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.967329086s) to execute
2021-10-09 23:51:18.424267 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.369451911s) to execute
2021-10-09 23:51:18.957687 I | auth: deleting token zIzkyGrxWVHqrrbr.855 for user conductor
2021-10-09 23:51:20.427356 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:22.957855 I | auth: deleting token RSOIYiOKnbFbEVmp.857 for user conductor
2021-10-09 23:51:22.957917 I | auth: deleting token upZlYIBKtHTrXpxi.858 for user conductor
2021-10-09 23:51:22.957929 I | auth: deleting token RDMwNftmTDoSgQhc.859 for user conductor
2021-10-09 23:51:22.957941 I | auth: deleting token mytotipqLKhuASly.860 for user conductor
2021-10-09 23:51:22.957955 I | auth: deleting token AhKbvJnRWQtnndJd.856 for user conductor
2021-10-09 23:51:23.128978 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.305544287s) to execute
2021-10-09 23:51:25.125235 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.991904382s) to execute
2021-10-09 23:51:25.125402 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.994089226s) to execute
2021-10-09 23:51:25.427701 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:26.023342 I | auth: deleting token FoGxaALTlOHWbAxQ.861 for user conductor
2021-10-09 23:51:26.957761 I | auth: deleting token ZyfgaCjeAthHIoYe.862 for user conductor
2021-10-09 23:51:27.227916 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.004387058s) to execute
2021-10-09 23:51:29.023091 I | auth: deleting token UfaqTNaXjlpxUyFx.863 for user conductor
2021-10-09 23:51:29.023147 I | auth: deleting token ErwEprhHCDbSKaMj.864 for user conductor
2021-10-09 23:51:30.427941 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:31.023127 I | auth: deleting token YdiRmwgUYxoHcoxV.865 for user conductor
2021-10-09 23:51:31.024542 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.670122264s) to execute
2021-10-09 23:51:33.223687 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900167163s) to execute
2021-10-09 23:51:33.223809 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.100485432s) to execute
2021-10-09 23:51:33.223863 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.098286914s) to execute
2021-10-09 23:51:34.023901 I | auth: deleting token FccSYSDyLhNnDOSp.866 for user conductor
2021-10-09 23:51:35.226417 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.999515242s) to execute
2021-10-09 23:51:35.226600 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903392969s) to execute
2021-10-09 23:51:35.428239 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:35.455470 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (225.710373ms) to execute
2021-10-09 23:51:37.023290 I | auth: deleting token TLWPlsgkObhoCHOb.867 for user conductor
2021-10-09 23:51:38.625477 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (202.015857ms) to execute
2021-10-09 23:51:40.523645 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:40.955802 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (132.296206ms) to execute
2021-10-09 23:51:42.957855 I | auth: deleting token iDIWYxVhGqolQuIc.871 for user conductor
2021-10-09 23:51:42.957915 I | auth: deleting token myFdquEdEGpewPzE.869 for user conductor
2021-10-09 23:51:43.957748 I | auth: deleting token ZvmaPtUYRvcZpUXO.872 for user conductor
2021-10-09 23:51:43.957799 I | auth: deleting token eSOvpaRnjdByEPQd.868 for user conductor
2021-10-09 23:51:43.957814 I | auth: deleting token xqvUyUpSkWeYfaZz.870 for user conductor
2021-10-09 23:51:45.524037 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:45.957689 I | auth: deleting token stinkeuQyKAmWPYg.873 for user conductor
2021-10-09 23:51:48.957756 I | auth: deleting token eXMuGvVDWiFlLWoy.874 for user conductor
2021-10-09 23:51:50.524418 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:51.957745 I | auth: deleting token ZTOJOrZbaYfXrKXs.875 for user conductor
2021-10-09 23:51:54.957750 I | auth: deleting token XFpqeTqMndAYRZqd.876 for user conductor
2021-10-09 23:51:55.524632 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:51:57.957888 I | auth: deleting token XUqRzkAknRxatxeH.877 for user conductor
2021-10-09 23:52:00.024009 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.600638166s) to execute
2021-10-09 23:52:00.127171 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (100.160739ms) to execute
2021-10-09 23:52:00.524876 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:00.957731 I | auth: deleting token sBOlAUHscmrTnntg.879 for user conductor
2021-10-09 23:52:00.957794 I | auth: deleting token vHKPOFyDTTfMzVEo.878 for user conductor
2021-10-09 23:52:02.957731 I | auth: deleting token ZEWmUxvjRJaMQhcp.882 for user conductor
2021-10-09 23:52:02.957808 I | auth: deleting token JTcNzCmMhkRdqeJt.881 for user conductor
2021-10-09 23:52:04.128819 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.774447111s) to execute
2021-10-09 23:52:04.957778 I | auth: deleting token pRBBsWEpkjzlTfvO.885 for user conductor
2021-10-09 23:52:04.957847 I | auth: deleting token toxgjMDZOmYcKIqt.884 for user conductor
2021-10-09 23:52:05.525203 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:07.023120 I | auth: deleting token YXPXunVZsQGCmbdY.886 for user conductor
2021-10-09 23:52:08.827787 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.967709874s) to execute
2021-10-09 23:52:09.957786 I | auth: deleting token PNSylryoaIXbGjzw.887 for user conductor
2021-10-09 23:52:09.957850 I | auth: deleting token JJRYaDJikYrKIjuq.888 for user conductor
2021-10-09 23:52:10.525377 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:10.926988 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096797076s) to execute
2021-10-09 23:52:10.927278 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.969070498s) to execute
2021-10-09 23:52:11.957716 I | auth: deleting token mPJcPzWSSvSVzgDH.889 for user conductor
2021-10-09 23:52:12.957798 I | auth: deleting token vcHmzFQPqdSHCUoT.890 for user conductor
2021-10-09 23:52:14.957820 I | auth: deleting token uyNkZXtjtMtLKTcZ.891 for user conductor
2021-10-09 23:52:15.224681 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.200046551s) to execute
2021-10-09 23:52:15.525600 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:17.023198 I | auth: deleting token RwVFQvgWbHQTEdQG.892 for user conductor
2021-10-09 23:52:17.329812 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.104950712s) to execute
2021-10-09 23:52:17.330344 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.102430136s) to execute
2021-10-09 23:52:19.023171 I | auth: deleting token eUAMErOsuAeWwOfe.894 for user conductor
2021-10-09 23:52:19.023224 I | auth: deleting token uCzncMzkBbBGOlhU.893 for user conductor
2021-10-09 23:52:19.023240 I | auth: deleting token FmNEPjrnwmrIHcmz.895 for user conductor
2021-10-09 23:52:19.523633 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.295652883s) to execute
2021-10-09 23:52:19.523759 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.100367064s) to execute
2021-10-09 23:52:19.523870 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.095373516s) to execute
2021-10-09 23:52:20.525964 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:21.023332 I | auth: deleting token qWxclRPpEmCdhkff.896 for user conductor
2021-10-09 23:52:21.023383 I | auth: deleting token OFQPfkPxFfdcsiwT.897 for user conductor
2021-10-09 23:52:22.957831 I | auth: deleting token FnJICHyeXJbSkgvf.898 for user conductor
2021-10-09 23:52:23.624805 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.963801806s) to execute
2021-10-09 23:52:25.023156 I | auth: deleting token aqZNUuTiplUxwsgT.899 for user conductor
2021-10-09 23:52:25.526202 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:27.828974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705412483s) to execute
2021-10-09 23:52:28.023161 I | auth: deleting token LgWqKJUUmaHYGYUw.900 for user conductor
2021-10-09 23:52:29.631095 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.676661403s) to execute
2021-10-09 23:52:29.631246 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.70564775s) to execute
2021-10-09 23:52:29.957803 I | auth: deleting token QjtqaJNgqSGuPNoG.902 for user conductor
2021-10-09 23:52:29.957862 I | auth: deleting token OQRkjCIfViVVVRMY.901 for user conductor
2021-10-09 23:52:29.957873 I | auth: deleting token dmFzHOjBZpkqCuCM.903 for user conductor
2021-10-09 23:52:30.623259 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:31.957788 I | auth: deleting token QMyxumSQkomQZrUf.904 for user conductor
2021-10-09 23:52:33.929306 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.203302488s) to execute
2021-10-09 23:52:33.929653 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (4.205960263s) to execute
2021-10-09 23:52:35.023087 I | auth: deleting token YtbDFKqEgtmidGLa.905 for user conductor
2021-10-09 23:52:35.624322 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:36.324886 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.301461367s) to execute
2021-10-09 23:52:36.523339 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.303154914s) to execute
2021-10-09 23:52:36.523488 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.299860874s) to execute
2021-10-09 23:52:38.023252 I | auth: deleting token tubyMTXdGQOPJKyF.906 for user conductor
2021-10-09 23:52:38.525866 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002194904s) to execute
2021-10-09 23:52:40.624680 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:40.957733 I | auth: deleting token cqHaBNrbmqiRmMxJ.908 for user conductor
2021-10-09 23:52:40.957791 I | auth: deleting token SnttLwzkHJpdaOJV.907 for user conductor
2021-10-09 23:52:42.531228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.776802269s) to execute
2021-10-09 23:52:42.531593 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.908035333s) to execute
2021-10-09 23:52:44.825041 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.201654907s) to execute
2021-10-09 23:52:44.825171 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.001642087s) to execute
2021-10-09 23:52:44.957783 I | auth: deleting token nWDGlsCLknYGGkOj.910 for user conductor
2021-10-09 23:52:45.625062 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:46.957739 I | auth: deleting token jAsitfxXmVCZdaMw.909 for user conductor
2021-10-09 23:52:47.123920 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.169138413s) to execute
2021-10-09 23:52:47.124017 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.296037591s) to execute
2021-10-09 23:52:47.323090 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.787484ms) to execute
2021-10-09 23:52:48.957811 I | auth: deleting token YosrRbBTScUeRPYf.911 for user conductor
2021-10-09 23:52:48.957917 I | auth: deleting token ecQcsIcCodmgRzTi.913 for user conductor
2021-10-09 23:52:48.957939 I | auth: deleting token PZYdwfwcJftJeBDw.914 for user conductor
2021-10-09 23:52:48.957953 I | auth: deleting token EtcdjNIScAthKGCi.912 for user conductor
2021-10-09 23:52:49.229860 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.97237223s) to execute
2021-10-09 23:52:50.625408 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:51.024384 I | auth: deleting token plxLPfaDRYUptEhT.915 for user conductor
2021-10-09 23:52:51.024445 I | auth: deleting token qNSQSuOtzxmYtjcn.916 for user conductor
2021-10-09 23:52:51.428299 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.373903034s) to execute
2021-10-09 23:52:53.525844 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.00241391s) to execute
2021-10-09 23:52:53.525990 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.801319949s) to execute
2021-10-09 23:52:54.957725 I | auth: deleting token aRBtQLyJwQzCdhmV.918 for user conductor
2021-10-09 23:52:54.957773 I | auth: deleting token teYSInnDjIPKwUUg.917 for user conductor
2021-10-09 23:52:55.625661 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:52:55.725853 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.09970136s) to execute
2021-10-09 23:52:55.726151 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.102706023s) to execute
2021-10-09 23:52:56.957758 I | auth: deleting token REHOOEXZnxsDjDau.919 for user conductor
2021-10-09 23:52:58.957856 I | auth: deleting token fFjIyboinMlGvIyX.920 for user conductor
2021-10-09 23:52:58.957933 I | auth: deleting token zBjFjDZzEDXWSkow.921 for user conductor
2021-10-09 23:52:59.824190 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.093546884s) to execute
2021-10-09 23:52:59.824357 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.070062665s) to execute
2021-10-09 23:52:59.824476 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (4.095910185s) to execute
2021-10-09 23:53:00.625935 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:01.828611 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (173.47982ms) to execute
2021-10-09 23:53:01.957735 I | auth: deleting token aJfXddxeiUsoneuE.923 for user conductor
2021-10-09 23:53:01.957780 I | auth: deleting token tBZeQlkdKyqaPgwh.922 for user conductor
2021-10-09 23:53:05.626223 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:05.926467 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.771950604s) to execute
2021-10-09 23:53:06.023105 I | auth: deleting token czGmnWOAQODklyCr.925 for user conductor
2021-10-09 23:53:06.023155 I | auth: deleting token OjKzoGfUPohyHqcV.924 for user conductor
2021-10-09 23:53:08.023263 I | auth: deleting token QGhqnKnXsFuIYvgN.927 for user conductor
2021-10-09 23:53:08.023383 I | auth: deleting token avUDrpxUcCkwQtMZ.928 for user conductor
2021-10-09 23:53:08.023420 I | auth: deleting token xlSkmDlLpkQgvkFg.926 for user conductor
2021-10-09 23:53:08.227619 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.004273613s) to execute
2021-10-09 23:53:10.223291 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (368.940014ms) to execute
2021-10-09 23:53:10.723228 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:13.957766 I | auth: deleting token DSSoxKRzjPGlbBYl.929 for user conductor
2021-10-09 23:53:13.957822 I | auth: deleting token dfpViYWYKFjpRvwT.932 for user conductor
2021-10-09 23:53:13.957836 I | auth: deleting token KswPkLOJCoEhfCOR.930 for user conductor
2021-10-09 23:53:13.957847 I | auth: deleting token mjrAzPwUtMEeAnDU.931 for user conductor
2021-10-09 23:53:13.957863 I | auth: deleting token ixtdUIVqzLjyOZva.933 for user conductor
2021-10-09 23:53:15.528676 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (574.047434ms) to execute
2021-10-09 23:53:15.723500 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:17.957824 I | auth: deleting token ilYQnxXNgSbJQesG.934 for user conductor
2021-10-09 23:53:17.957906 I | auth: deleting token ouuMoVVJkDXaNBzz.935 for user conductor
2021-10-09 23:53:17.957932 I | auth: deleting token kBzlwkXVzdZWfmRO.936 for user conductor
2021-10-09 23:53:18.024033 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (669.545107ms) to execute
2021-10-09 23:53:18.354919 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.927364ms) to execute
2021-10-09 23:53:20.023208 I | auth: deleting token SWHZNYFzLxlWIqqB.937 for user conductor
2021-10-09 23:53:20.723947 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:21.624470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.766176778s) to execute
2021-10-09 23:53:21.957815 I | auth: deleting token FSMFhWWZzRrVMeme.938 for user conductor
2021-10-09 23:53:21.957897 I | auth: deleting token tqhkadqDuvEAjATA.939 for user conductor
2021-10-09 23:53:23.527965 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (773.359082ms) to execute
2021-10-09 23:53:23.957759 I | auth: deleting token JVaUdviwIYVlaNfy.941 for user conductor
2021-10-09 23:53:25.023169 I | auth: deleting token VCtUCqEApwKUXTxl.940 for user conductor
2021-10-09 23:53:25.023231 I | auth: deleting token SbsfoPZHcYrGuvZH.942 for user conductor
2021-10-09 23:53:25.724248 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:26.527470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (172.872718ms) to execute
2021-10-09 23:53:28.957830 I | auth: deleting token LqAeTSCWzUnjPNaV.944 for user conductor
2021-10-09 23:53:28.957886 I | auth: deleting token CGtPJCrwxyWCbQOY.945 for user conductor
2021-10-09 23:53:28.957900 I | auth: deleting token ANUGWMxpiJZMjnYt.943 for user conductor
2021-10-09 23:53:30.724798 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:34.957827 I | auth: deleting token UuUvDzEVwcixQykl.946 for user conductor
2021-10-09 23:53:35.725026 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:37.023132 I | auth: deleting token gCCdpXiQbMwLkxQY.949 for user conductor
2021-10-09 23:53:37.023183 I | auth: deleting token VuZwkcMzZxqWYtCO.948 for user conductor
2021-10-09 23:53:37.023199 I | auth: deleting token epOnTZdSeBtIeRDb.947 for user conductor
2021-10-09 23:53:38.957745 I | auth: deleting token fbVdVZsXNSQXvWUB.951 for user conductor
2021-10-09 23:53:38.957808 I | auth: deleting token ItpjJBLKdozrsDSI.950 for user conductor
2021-10-09 23:53:40.627086 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.871120736s) to execute
2021-10-09 23:53:40.725270 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:40.755668 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (125.878412ms) to execute
2021-10-09 23:53:40.857487 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (227.305732ms) to execute
2021-10-09 23:53:40.957794 I | auth: deleting token AUbRXPYKuaNuRmlr.952 for user conductor
2021-10-09 23:53:41.154934 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (396.659023ms) to execute
2021-10-09 23:53:43.129284 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (203.427165ms) to execute
2021-10-09 23:53:43.957796 I | auth: deleting token PSqIphzZUSRVRbpp.953 for user conductor
2021-10-09 23:53:45.725685 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:45.957855 I | auth: deleting token JljmiinpWaHZQEws.954 for user conductor
2021-10-09 23:53:48.957867 I | auth: deleting token XAzYpNAGtgepQGtJ.955 for user conductor
2021-10-09 23:53:50.726139 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:51.524764 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (701.507146ms) to execute
2021-10-09 23:53:52.023122 I | auth: deleting token DiBnXQSwrhqxpehZ.956 for user conductor
2021-10-09 23:53:53.726744 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (303.307383ms) to execute
2021-10-09 23:53:55.726531 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:53:56.023049 I | auth: deleting token EvudLuxWxjFTmuwU.958 for user conductor
2021-10-09 23:53:56.023139 I | auth: deleting token XHRkkJkyXjcQNbtW.957 for user conductor
2021-10-09 23:53:56.524510 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (498.151975ms) to execute
2021-10-09 23:53:58.023107 I | auth: deleting token MICaWEkQQesIBKcC.960 for user conductor
2021-10-09 23:54:00.023190 I | auth: deleting token vJklnlIpRlEOZGnJ.962 for user conductor
2021-10-09 23:54:00.023290 I | auth: deleting token jpiiuLCsgIYtnPNf.959 for user conductor
2021-10-09 23:54:00.023306 I | auth: deleting token JmVcuNfPsrsNqMxO.961 for user conductor
2021-10-09 23:54:00.726756 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:02.626101 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.096349745s) to execute
2021-10-09 23:54:05.726953 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:05.957707 I | auth: deleting token SOBiLuHEDiKDQyAb.963 for user conductor
2021-10-09 23:54:05.957769 I | auth: deleting token kxMxhHWhACKWouxr.964 for user conductor
2021-10-09 23:54:05.957809 I | auth: deleting token iUfBoZgJxKShRuFG.965 for user conductor
2021-10-09 23:54:08.154688 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (128.812051ms) to execute
2021-10-09 23:54:10.727197 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:12.023208 I | auth: deleting token pYnsNnRjGhqYrIpC.967 for user conductor
2021-10-09 23:54:12.023253 I | auth: deleting token qpVLrnsihIGfhUDn.968 for user conductor
2021-10-09 23:54:13.957758 I | auth: deleting token hZaAjzUrEgsvmJlB.969 for user conductor
2021-10-09 23:54:13.957807 I | auth: deleting token GkMQxfSEZVmyDyTt.966 for user conductor
2021-10-09 23:54:13.957829 I | auth: deleting token GFytgseomTAZJamP.970 for user conductor
2021-10-09 23:54:14.626038 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.002556583s) to execute
2021-10-09 23:54:15.727534 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:16.023219 I | auth: deleting token ZqlediEODANAwsrk.971 for user conductor
2021-10-09 23:54:17.957820 I | auth: deleting token KaZneXsRJCRnBuNd.973 for user conductor
2021-10-09 23:54:20.323575 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.500264763s) to execute
2021-10-09 23:54:20.454651 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (128.167565ms) to execute
2021-10-09 23:54:20.456845 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (130.183511ms) to execute
2021-10-09 23:54:20.457021 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (130.194238ms) to execute
2021-10-09 23:54:20.727715 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:22.023184 I | auth: deleting token UsLIkEhvPxvddMlf.975 for user conductor
2021-10-09 23:54:22.023227 I | auth: deleting token wVgYAgEVkBQkwxYs.976 for user conductor
2021-10-09 23:54:22.023240 I | auth: deleting token uHHIPipGJwVqnSeD.972 for user conductor
2021-10-09 23:54:22.023245 I | auth: deleting token PePlLecwlZIZiubh.974 for user conductor
2021-10-09 23:54:24.023236 I | auth: deleting token fIJvItlJgFqfLOWV.977 for user conductor
2021-10-09 23:54:24.124652 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.265188447s) to execute
2021-10-09 23:54:25.727979 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:26.026655 I | auth: deleting token ZyyQUWNxICsJcymO.979 for user conductor
2021-10-09 23:54:26.026715 I | auth: deleting token rZXTYsnKtKCENOZw.978 for user conductor
2021-10-09 23:54:26.026729 I | auth: deleting token dTSZswcgkYIwLcah.980 for user conductor
2021-10-09 23:54:26.028064 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.704400444s) to execute
2021-10-09 23:54:28.127108 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.098820016s) to execute
2021-10-09 23:54:28.127568 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.000470857s) to execute
2021-10-09 23:54:28.326243 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.202740496s) to execute
2021-10-09 23:54:30.127442 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.803964395s) to execute
2021-10-09 23:54:30.127894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.799158375s) to execute
2021-10-09 23:54:30.728290 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:30.957804 I | auth: deleting token RHFXPAqmtghoDrLl.981 for user conductor
2021-10-09 23:54:32.226887 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.903569216s) to execute
2021-10-09 23:54:32.227218 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.203946196s) to execute
2021-10-09 23:54:32.957756 I | auth: deleting token UxKQPugsHiTKPhjQ.982 for user conductor
2021-10-09 23:54:34.226584 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.901378774s) to execute
2021-10-09 23:54:35.728678 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:36.554757 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.121407ms) to execute
2021-10-09 23:54:36.957791 I | auth: deleting token IspfnkwgnydPpJKI.984 for user conductor
2021-10-09 23:54:36.957844 I | auth: deleting token YBgStDwgkrZvyBeJ.983 for user conductor
2021-10-09 23:54:36.957858 I | auth: deleting token OGXAtrzBPEUAIdhw.986 for user conductor
2021-10-09 23:54:36.957869 I | auth: deleting token DWtukYbApPqSiaoE.985 for user conductor
2021-10-09 23:54:36.957878 I | auth: deleting token kkfvvqyNJUsUMXNd.987 for user conductor
2021-10-09 23:54:39.526162 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (571.366298ms) to execute
2021-10-09 23:54:40.728994 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:41.425943 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.896196072s) to execute
2021-10-09 23:54:42.957750 I | auth: deleting token QwHdYpJHUgPlOHAe.991 for user conductor
2021-10-09 23:54:42.957791 I | auth: deleting token ftXWnbdiZJfOWCMZ.990 for user conductor
2021-10-09 23:54:42.957807 I | auth: deleting token nOyQIyeIxjnzKdAr.989 for user conductor
2021-10-09 23:54:43.326132 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.771731558s) to execute
2021-10-09 23:54:43.326331 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.802856436s) to execute
2021-10-09 23:54:43.454548 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (125.14996ms) to execute
2021-10-09 23:54:44.958025 I | auth: deleting token jpNlqYsqsWpttyME.992 for user conductor
2021-10-09 23:54:44.958120 I | auth: deleting token vcrpJtuEPpYpgTvi.993 for user conductor
2021-10-09 23:54:44.958153 I | auth: deleting token cGXVyKVtOQNaMelT.988 for user conductor
2021-10-09 23:54:45.729275 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:47.726536 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.503143249s) to execute
2021-10-09 23:54:48.957711 I | auth: deleting token HotAMQPLsscQWcPl.996 for user conductor
2021-10-09 23:54:48.957763 I | auth: deleting token pSIzuoujkMaVLsRu.994 for user conductor
2021-10-09 23:54:49.957732 I | auth: deleting token jkeUtLIsbKexfuQt.995 for user conductor
2021-10-09 23:54:49.957789 I | auth: deleting token niExzFSqgxggXymY.997 for user conductor
2021-10-09 23:54:50.729668 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:51.931599 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.174778356s) to execute
2021-10-09 23:54:52.023157 I | auth: deleting token fKCzSnYladewRGuH.998 for user conductor
2021-10-09 23:54:55.023141 I | auth: deleting token AmTqOmhUCWJYNgBN.1000 for user conductor
2021-10-09 23:54:55.023195 I | auth: deleting token ozkposlGjKXwcYBo.999 for user conductor
2021-10-09 23:54:55.730029 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:54:55.957792 I | auth: deleting token zCIVBowGqskJlHzI.1002 for user conductor
2021-10-09 23:54:55.957879 I | auth: deleting token walCNIenbEDWuVrd.1001 for user conductor
2021-10-09 23:54:58.027190 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.201064058s) to execute
2021-10-09 23:54:58.046801 I | auth: deleting token NgQqenMMSysrljER.1003 for user conductor
2021-10-09 23:54:59.957792 I | auth: deleting token pkLASGXBNUJMRaON.1005 for user conductor
2021-10-09 23:55:00.024712 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (801.170103ms) to execute
2021-10-09 23:55:00.730259 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:01.724200 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.669879968s) to execute
2021-10-09 23:55:01.955848 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (126.612726ms) to execute
2021-10-09 23:55:05.425002 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.770504289s) to execute
2021-10-09 23:55:05.730684 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:05.957806 I | auth: deleting token AiYQxRKXWWAjJziq.1007 for user conductor
2021-10-09 23:55:05.957862 I | auth: deleting token zNGeVfgCnpncyLZk.1004 for user conductor
2021-10-09 23:55:05.957874 I | auth: deleting token IciMvgcAYyGTgczl.1009 for user conductor
2021-10-09 23:55:05.957890 I | auth: deleting token dyONiJmBWepPdkja.1006 for user conductor
2021-10-09 23:55:05.957901 I | auth: deleting token YQhhkBitFRzvAvmu.1008 for user conductor
2021-10-09 23:55:09.957785 I | auth: deleting token PqzVHneQITzmkQXB.1011 for user conductor
2021-10-09 23:55:09.957877 I | auth: deleting token UmSIBFTMpZoVZWXl.1010 for user conductor
2021-10-09 23:55:10.731267 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:10.957804 I | auth: deleting token NtgcCMcumZXIBPIq.1012 for user conductor
2021-10-09 23:55:13.928600 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.771743907s) to execute
2021-10-09 23:55:14.957837 I | auth: deleting token FuTKrcFvMLesKsrQ.1013 for user conductor
2021-10-09 23:55:14.957905 I | auth: deleting token CWMSHRaTWXslHiYc.1015 for user conductor
2021-10-09 23:55:15.731659 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:17.023194 I | auth: deleting token EiHTVXFohVKlAuty.1014 for user conductor
2021-10-09 23:55:18.025524 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.899754679s) to execute
2021-10-09 23:55:20.031505 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.676966047s) to execute
2021-10-09 23:55:20.731927 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:21.023079 I | auth: deleting token cbEPUyVNUvWXJtQy.1019 for user conductor
2021-10-09 23:55:21.023114 I | auth: deleting token EcrlCIJcZnKkKVGk.1020 for user conductor
2021-10-09 23:55:21.023125 I | auth: deleting token DpWpaUYZMWfeNOHN.1017 for user conductor
2021-10-09 23:55:21.023132 I | auth: deleting token yGGAYxbQGWNfoVaW.1016 for user conductor
2021-10-09 23:55:21.023137 I | auth: deleting token kvXSlgUOFLpinvPb.1018 for user conductor
2021-10-09 23:55:22.030114 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.805166502s) to execute
2021-10-09 23:55:23.624663 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.592403966s) to execute
2021-10-09 23:55:23.624771 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.499198185s) to execute
2021-10-09 23:55:23.754757 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (127.141312ms) to execute
2021-10-09 23:55:25.023314 I | auth: deleting token ZvkJgkJLnwqUrQow.1021 for user conductor
2021-10-09 23:55:25.023378 I | auth: deleting token zxccfyFHOBjJCnyB.1023 for user conductor
2021-10-09 23:55:25.023390 I | auth: deleting token PxVbyIQYDFKslVwu.1022 for user conductor
2021-10-09 23:55:25.823238 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:25.828275 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.070128283s) to execute
2021-10-09 23:55:27.630761 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705287907s) to execute
2021-10-09 23:55:29.023121 I | auth: deleting token MtbvGjzEDQTYsrha.1025 for user conductor
2021-10-09 23:55:29.023178 I | auth: deleting token cdzbJAPXEUQaOXhe.1024 for user conductor
2021-10-09 23:55:29.023188 I | auth: deleting token eocwiWuwpRHoZHhJ.1026 for user conductor
2021-10-09 23:55:29.424812 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.601485262s) to execute
2021-10-09 23:55:29.424987 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.701421079s) to execute
2021-10-09 23:55:29.654450 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (124.888322ms) to execute
2021-10-09 23:55:30.823690 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:30.957758 I | auth: deleting token jlcnnJTalIycggxN.1027 for user conductor
2021-10-09 23:55:34.957892 I | auth: deleting token YuvWCYRnjnLaKdha.1029 for user conductor
2021-10-09 23:55:34.957940 I | auth: deleting token YxVCMsYRLYZjIiXg.1031 for user conductor
2021-10-09 23:55:34.957949 I | auth: deleting token idEoPtHeEYyOHmqB.1030 for user conductor
2021-10-09 23:55:34.957956 I | auth: deleting token FhwKhltzPFLAfXjH.1028 for user conductor
2021-10-09 23:55:35.824054 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:36.957791 I | auth: deleting token sZBAjFoKSrHHatuk.1032 for user conductor
2021-10-09 23:55:40.824468 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:42.957788 I | auth: deleting token AaqomUaeOWYTcCpE.1037 for user conductor
2021-10-09 23:55:42.957859 I | auth: deleting token gCIfUQLPevMTQLrr.1036 for user conductor
2021-10-09 23:55:42.957880 I | auth: deleting token PWOJJcLdcdzkDDBu.1038 for user conductor
2021-10-09 23:55:42.957895 I | auth: deleting token EMylYRndivClGnVH.1035 for user conductor
2021-10-09 23:55:42.957914 I | auth: deleting token ZqTaFTOauWGCcaXE.1034 for user conductor
2021-10-09 23:55:42.957935 I | auth: deleting token VPdbUBHqZUkbCvcp.1033 for user conductor
2021-10-09 23:55:43.224553 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.768185424s) to execute
2021-10-09 23:55:45.425132 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.168781686s) to execute
2021-10-09 23:55:45.425532 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.198179751s) to execute
2021-10-09 23:55:45.824736 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:46.957716 I | auth: deleting token ZonZUBGAuNKATJjd.1040 for user conductor
2021-10-09 23:55:46.957775 I | auth: deleting token NUndhmzFtaRIekQF.1039 for user conductor
2021-10-09 23:55:49.023156 I | auth: deleting token yMEeAPcLVmfgzVnc.1042 for user conductor
2021-10-09 23:55:49.023225 I | auth: deleting token LeKuZOYMNUKrYQud.1041 for user conductor
2021-10-09 23:55:49.957679 I | auth: deleting token pEQeSFjdIxrhjUXX.1043 for user conductor
2021-10-09 23:55:50.824970 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:51.428583 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.702165131s) to execute
2021-10-09 23:55:53.957776 I | auth: deleting token hXjaGjFCRnvcUetj.1044 for user conductor
2021-10-09 23:55:54.957855 I | auth: deleting token hWtzlgJegQeVjGNt.1045 for user conductor
2021-10-09 23:55:55.825232 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:55:55.957708 I | auth: deleting token kNyhluaxYxiBUiFU.1046 for user conductor
2021-10-09 23:55:59.957818 I | auth: deleting token ebVrEvptozrVThsH.1049 for user conductor
2021-10-09 23:55:59.957882 I | auth: deleting token PvIdpjRlQTzWBjBo.1048 for user conductor
2021-10-09 23:55:59.957900 I | auth: deleting token bUrMupTovnXnuDMM.1047 for user conductor
2021-10-09 23:56:00.825554 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:01.957766 I | auth: deleting token kfpQiddqWgLUhekj.1051 for user conductor
2021-10-09 23:56:01.957866 I | auth: deleting token klbiZEQbLPGIzsNA.1050 for user conductor
2021-10-09 23:56:03.957704 I | auth: deleting token brkoIujXeBHifegz.1052 for user conductor
2021-10-09 23:56:03.957752 I | auth: deleting token XlMGNQMviyayqkJZ.1053 for user conductor
2021-10-09 23:56:05.825897 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:06.957851 I | auth: deleting token iksiCdnFwKyKAZqT.1054 for user conductor
2021-10-09 23:56:06.957995 I | auth: deleting token cNeigdRqlDvJGEwW.1055 for user conductor
2021-10-09 23:56:09.430726 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.774205736s) to execute
2021-10-09 23:56:10.826237 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:13.023359 I | auth: deleting token zkaWBmpVFcBzEEGH.1058 for user conductor
2021-10-09 23:56:13.023453 I | auth: deleting token IERFnrXkEHQvRMuT.1060 for user conductor
2021-10-09 23:56:13.023472 I | auth: deleting token pRMPuRaVYRdliAKx.1056 for user conductor
2021-10-09 23:56:13.023486 I | auth: deleting token uBIWiUEEZlIkXUig.1057 for user conductor
2021-10-09 23:56:13.023504 I | auth: deleting token HbXELAkLpPdRxNeF.1059 for user conductor
2021-10-09 23:56:14.928817 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.773803666s) to execute
2021-10-09 23:56:15.826505 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:17.023093 I | auth: deleting token PAnSDCZpzcawHyQX.1063 for user conductor
2021-10-09 23:56:17.023207 I | auth: deleting token CGJQIJNYeAQeTshc.1061 for user conductor
2021-10-09 23:56:17.023265 I | auth: deleting token ZrrMDQjkTpzstitP.1062 for user conductor
2021-10-09 23:56:17.124406 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.069854791s) to execute
2021-10-09 23:56:18.827061 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.672591421s) to execute
2021-10-09 23:56:18.827200 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.700031605s) to execute
2021-10-09 23:56:18.957803 I | auth: deleting token CQFfFLFmjHKgqEdE.1065 for user conductor
2021-10-09 23:56:18.957888 I | auth: deleting token FSfKffRrasEAFTsM.1064 for user conductor
2021-10-09 23:56:20.826786 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:24.023232 I | auth: deleting token ddQwZBWeWYkzaYQr.1066 for user conductor
2021-10-09 23:56:24.023328 I | auth: deleting token VZrkLnBRStFAmieB.1068 for user conductor
2021-10-09 23:56:24.724592 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.001220053s) to execute
2021-10-09 23:56:25.827120 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:26.023081 I | auth: deleting token fTqvRmjabGqBjfRa.1069 for user conductor
2021-10-09 23:56:26.023133 I | auth: deleting token iBUNqsKmCmpUKIuk.1067 for user conductor
2021-10-09 23:56:26.023153 I | auth: deleting token CVJMzWRkvxaMyqai.1071 for user conductor
2021-10-09 23:56:26.023164 I | auth: deleting token aLGFpUgpjBXBNtxD.1070 for user conductor
2021-10-09 23:56:26.725114 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.801632896s) to execute
2021-10-09 23:56:26.725238 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (663.62909ms) to execute
2021-10-09 23:56:28.328989 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.405561499s) to execute
2021-10-09 23:56:30.827408 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:31.957772 I | auth: deleting token UQmHnjruGBNfocyA.1073 for user conductor
2021-10-09 23:56:33.957791 I | auth: deleting token KaesTArmJfTScfcz.1074 for user conductor
2021-10-09 23:56:33.957866 I | auth: deleting token NtSIBHwROGrYcuOQ.1072 for user conductor
2021-10-09 23:56:35.827863 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:35.957796 I | auth: deleting token LiiqTBRBVWwJLjZc.1077 for user conductor
2021-10-09 23:56:35.957862 I | auth: deleting token DppeDJebIjwTvpHf.1075 for user conductor
2021-10-09 23:56:35.957876 I | auth: deleting token iIWGrebnckEiNPcB.1076 for user conductor
2021-10-09 23:56:36.957634 I | auth: deleting token hKyEaQrlXCwOVhIr.1078 for user conductor
2021-10-09 23:56:38.957656 I | auth: deleting token EyOplflXZsLcgukt.1080 for user conductor
2021-10-09 23:56:38.957706 I | auth: deleting token BnarfeIsnLUlNtvJ.1079 for user conductor
2021-10-09 23:56:40.824367 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.301019398s) to execute
2021-10-09 23:56:40.828239 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:41.023221 I | auth: deleting token PSqDBenWgfVtfSzk.1081 for user conductor
2021-10-09 23:56:41.023297 I | auth: deleting token abJBuXpChrmqxvuS.1082 for user conductor
2021-10-09 23:56:43.957727 I | auth: deleting token ZEJgMqttZpfqKCFl.1083 for user conductor
2021-10-09 23:56:44.030128 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.106938568s) to execute
2021-10-09 23:56:45.828622 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:46.126719 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003386202s) to execute
2021-10-09 23:56:46.126894 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.093929094s) to execute
2021-10-09 23:56:46.155961 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.12285458s) to execute
2021-10-09 23:56:46.957692 I | auth: deleting token mSrFyPveGDoBWfei.1084 for user conductor
2021-10-09 23:56:48.925709 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.067427562s) to execute
2021-10-09 23:56:48.957827 I | auth: deleting token MzaEwmdxDckYbAWK.1085 for user conductor
2021-10-09 23:56:50.828911 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:56:50.931361 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (206.674026ms) to execute
2021-10-09 23:56:51.957713 I | auth: deleting token BbsQLlwIdsaGDqYL.1086 for user conductor
2021-10-09 23:56:53.731757 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (407.398363ms) to execute
2021-10-09 23:56:53.954709 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (126.223452ms) to execute
2021-10-09 23:56:54.957701 I | auth: deleting token zkTyidFuVwCDytEO.1087 for user conductor
2021-10-09 23:56:55.829316 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:00.829636 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:00.957768 I | auth: deleting token SdqjNLHLLFSkSWdW.1089 for user conductor
2021-10-09 23:57:00.957828 I | auth: deleting token EqmklxzIBJituPyS.1091 for user conductor
2021-10-09 23:57:00.957839 I | auth: deleting token jbUFfJxIqdOaRCVb.1090 for user conductor
2021-10-09 23:57:00.957853 I | auth: deleting token qIAZkBbAZxLzQGmG.1092 for user conductor
2021-10-09 23:57:00.957861 I | auth: deleting token ziZNRanXXlKRznAo.1088 for user conductor
2021-10-09 23:57:04.957617 I | auth: deleting token alOljjcsXjgRRVuY.1094 for user conductor
2021-10-09 23:57:04.957664 I | auth: deleting token anuIoLVXrHUWCnkn.1095 for user conductor
2021-10-09 23:57:04.957676 I | auth: deleting token uXMMseaoeLhHiuHC.1093 for user conductor
2021-10-09 23:57:05.830086 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:08.957901 I | auth: deleting token kHgLmKgWaroAMVED.1096 for user conductor
2021-10-09 23:57:08.958033 I | auth: deleting token NrLZroCSRzZdePrO.1098 for user conductor
2021-10-09 23:57:09.957792 I | auth: deleting token prkOodIkTxrOwKqU.1099 for user conductor
2021-10-09 23:57:09.957865 I | auth: deleting token mlxGQzkcfzpBrQpi.1097 for user conductor
2021-10-09 23:57:10.830359 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:15.229284 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (669.541909ms) to execute
2021-10-09 23:57:15.923168 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:17.729733 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (375.351056ms) to execute
2021-10-09 23:57:17.957866 I | auth: deleting token JmRVdqQrYhRVXwDm.1102 for user conductor
2021-10-09 23:57:17.957936 I | auth: deleting token ivqCwyOtHCrRTyFK.1100 for user conductor
2021-10-09 23:57:17.957951 I | auth: deleting token OBHFiTqkenilSTrP.1104 for user conductor
2021-10-09 23:57:17.957964 I | auth: deleting token FlxBBkltlvfgYqSI.1105 for user conductor
2021-10-09 23:57:17.957974 I | auth: deleting token EpjAwDPFypIdzvzv.1101 for user conductor
2021-10-09 23:57:17.957983 I | auth: deleting token qthHRxGWqXUKrLKs.1103 for user conductor
2021-10-09 23:57:19.957778 I | auth: deleting token TNqHRVbZVUZKqASd.1106 for user conductor
2021-10-09 23:57:20.923521 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:21.725343 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.871153734s) to execute
2021-10-09 23:57:23.524457 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.70088695s) to execute
2021-10-09 23:57:23.524766 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.794522184s) to execute
2021-10-09 23:57:23.654727 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (127.352766ms) to execute
2021-10-09 23:57:23.957767 I | auth: deleting token ONabHVhYjnTiKGZp.1108 for user conductor
2021-10-09 23:57:23.957853 I | auth: deleting token iWdGHmhbtmTAjMvW.1109 for user conductor
2021-10-09 23:57:23.957884 I | auth: deleting token MjxGvFOAXoPcdnai.1107 for user conductor
2021-10-09 23:57:23.957910 I | auth: deleting token kePGrifXGYtYSoli.1110 for user conductor
2021-10-09 23:57:25.725246 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.067554459s) to execute
2021-10-09 23:57:25.725446 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.468443015s) to execute
2021-10-09 23:57:25.923904 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:27.957758 I | auth: deleting token fBZWHGLmuIODCpFv.1112 for user conductor
2021-10-09 23:57:29.957787 I | auth: deleting token mkqHLyHHpDiAYzSu.1111 for user conductor
2021-10-09 23:57:29.957858 I | auth: deleting token sjkLQXUOQFBJSvBj.1114 for user conductor
2021-10-09 23:57:30.924229 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:31.126784 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.303290978s) to execute
2021-10-09 23:57:33.324243 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.197266583s) to execute
2021-10-09 23:57:33.324794 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.101307848s) to execute
2021-10-09 23:57:33.423624 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.19997975s) to execute
2021-10-09 23:57:33.957838 I | auth: deleting token AFwLfXtUlzmupXAM.1113 for user conductor
2021-10-09 23:57:35.023126 I | auth: deleting token NODyvJBofsVfdRnj.1115 for user conductor
2021-10-09 23:57:35.023193 I | auth: deleting token OsvphSmhedjbtNaB.1116 for user conductor
2021-10-09 23:57:35.023205 I | auth: deleting token DAdfAGxpureGqXRD.1117 for user conductor
2021-10-09 23:57:35.924638 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:40.924907 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:41.827167 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.970724471s) to execute
2021-10-09 23:57:42.957741 I | auth: deleting token oVlDodLlchxbrTMJ.1120 for user conductor
2021-10-09 23:57:42.957821 I | auth: deleting token EzrQKbtpzSzVETSg.1119 for user conductor
2021-10-09 23:57:42.957860 I | auth: deleting token IeqtJqjiKbcYmpRp.1118 for user conductor
2021-10-09 23:57:42.957874 I | auth: deleting token nvPuxCgNQXLtQYXF.1121 for user conductor
2021-10-09 23:57:43.828858 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.905344711s) to execute
2021-10-09 23:57:43.829225 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.99876328s) to execute
2021-10-09 23:57:43.923777 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.092935783s) to execute
2021-10-09 23:57:43.924025 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.093348592s) to execute
2021-10-09 23:57:44.957785 I | auth: deleting token fYWzBcMlcRTSocSh.1123 for user conductor
2021-10-09 23:57:44.957835 I | auth: deleting token KDkBcHPxQajJGjdV.1122 for user conductor
2021-10-09 23:57:45.925242 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:48.023162 I | auth: deleting token jqduEuvwxgdVeNSc.1124 for user conductor
2021-10-09 23:57:48.023524 I | auth: deleting token dkFlBkasCrGbMUwI.1126 for user conductor
2021-10-09 23:57:48.023612 I | auth: deleting token RHMCZVFRGYrYbSmK.1125 for user conductor
2021-10-09 23:57:48.030047 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.875715285s) to execute
2021-10-09 23:57:48.154797 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (122.289255ms) to execute
2021-10-09 23:57:50.024940 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.799658497s) to execute
2021-10-09 23:57:50.025027 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (170.218491ms) to execute
2021-10-09 23:57:50.925554 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:51.828043 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.77179101s) to execute
2021-10-09 23:57:52.023299 I | auth: deleting token fqKQTBJpSXUvoAmJ.1129 for user conductor
2021-10-09 23:57:52.023341 I | auth: deleting token zQqGOkEyzcaYFMyS.1128 for user conductor
2021-10-09 23:57:52.023355 I | auth: deleting token cVwPwSBjNdMLdqOn.1127 for user conductor
2021-10-09 23:57:53.928259 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.404728143s) to execute
2021-10-09 23:57:55.926103 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:57:55.927587 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.804205497s) to execute
2021-10-09 23:57:55.957726 I | auth: deleting token XKvfrAyWgOXZSqEG.1132 for user conductor
2021-10-09 23:57:55.957786 I | auth: deleting token vaUyGRfQwJHYnbXX.1130 for user conductor
2021-10-09 23:57:55.957808 I | auth: deleting token tusGspDqtkEKmDFW.1133 for user conductor
2021-10-09 23:57:55.957821 I | auth: deleting token AheJNoixVEqAHBDV.1131 for user conductor
2021-10-09 23:57:58.025821 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.067930331s) to execute
2021-10-09 23:57:58.026063 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.096300178s) to execute
2021-10-09 23:57:59.957789 I | auth: deleting token JCbUsCtoCsjMyxym.1136 for user conductor
2021-10-09 23:57:59.957951 I | auth: deleting token bkSgCsdApotYKghI.1135 for user conductor
2021-10-09 23:57:59.958055 I | auth: deleting token UNNVYutYxVAkwHrG.1134 for user conductor
2021-10-09 23:58:00.926349 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:01.957922 I | auth: deleting token pnALUtpRBoVwpywm.1138 for user conductor
2021-10-09 23:58:01.958014 I | auth: deleting token VrcDkbflkdSbVoHf.1137 for user conductor
2021-10-09 23:58:05.655400 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (129.004544ms) to execute
2021-10-09 23:58:06.023185 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:06.023273 I | auth: deleting token cslBWHGOKoKfGgee.1139 for user conductor
2021-10-09 23:58:06.957815 I | auth: deleting token xaVQNkBsANJLcZbO.1140 for user conductor
2021-10-09 23:58:08.957837 I | auth: deleting token cqNVfaRyIToAiNpu.1142 for user conductor
2021-10-09 23:58:08.957907 I | auth: deleting token yQWupbctMQRqaRHH.1141 for user conductor
2021-10-09 23:58:10.957898 I | auth: deleting token iRirKoDEvNMUydhi.1143 for user conductor
2021-10-09 23:58:10.957982 I | auth: deleting token okexTRhsFLBzkQUd.1144 for user conductor
2021-10-09 23:58:11.023540 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:13.023150 I | auth: deleting token roHhXFDHaOpTCyYt.1145 for user conductor
2021-10-09 23:58:13.023262 I | auth: deleting token LFQDJxTrTgcUUUEI.1146 for user conductor
2021-10-09 23:58:16.023175 I | auth: deleting token jTqcHWnAAtyPHYAw.1147 for user conductor
2021-10-09 23:58:16.023218 I | auth: deleting token jLesygjakbmbubUV.1148 for user conductor
2021-10-09 23:58:16.023908 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:16.125689 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.192395756s) to execute
2021-10-09 23:58:16.254759 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.528967ms) to execute
2021-10-09 23:58:16.256813 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (128.163136ms) to execute
2021-10-09 23:58:16.256859 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.897781ms) to execute
2021-10-09 23:58:18.957760 I | auth: deleting token dQNUpKPbcyjwqJpa.1150 for user conductor
2021-10-09 23:58:18.957807 I | auth: deleting token mBGGGRyvsOUvVysj.1149 for user conductor
2021-10-09 23:58:21.024347 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:22.017701 I | auth: deleting token pRraZtVExPNZfgnU.1151 for user conductor
2021-10-09 23:58:22.017765 I | auth: deleting token vmhWxoDCSQWVVPSi.1152 for user conductor
2021-10-09 23:58:22.329470 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.775221013s) to execute
2021-10-09 23:58:23.957734 I | auth: deleting token HVKUREhoHVEXyItu.1154 for user conductor
2021-10-09 23:58:23.957804 I | auth: deleting token JzbUFQsQPRSISQso.1153 for user conductor
2021-10-09 23:58:24.732326 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.808925639s) to execute
2021-10-09 23:58:26.024573 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:26.525348 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.699595291s) to execute
2021-10-09 23:58:26.957777 I | auth: deleting token hOdCaiWrbORlMBGi.1155 for user conductor
2021-10-09 23:58:26.957847 I | auth: deleting token YlXRgYsCfmMHEfhq.1156 for user conductor
2021-10-09 23:58:28.726864 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (872.097562ms) to execute
2021-10-09 23:58:28.957807 I | auth: deleting token zKJVdMyTuKbhRkht.1157 for user conductor
2021-10-09 23:58:29.957798 I | auth: deleting token fegwDesbxLXpXOvY.1158 for user conductor
2021-10-09 23:58:31.024805 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:31.957790 I | auth: deleting token fATpszeMaIkDXTrt.1159 for user conductor
2021-10-09 23:58:32.831775 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.005542206s) to execute
2021-10-09 23:58:32.957773 I | auth: deleting token EWzjHqwORGMtbwBT.1160 for user conductor
2021-10-09 23:58:34.931849 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.906423053s) to execute
2021-10-09 23:58:34.932149 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.008647618s) to execute
2021-10-09 23:58:34.958025 I | auth: deleting token waMkjUVqgSlvpxbu.1162 for user conductor
2021-10-09 23:58:34.958084 I | auth: deleting token HSNWAKrRxeqJMLxY.1164 for user conductor
2021-10-09 23:58:35.054743 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.130951558s) to execute
2021-10-09 23:58:35.155705 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (132.197169ms) to execute
2021-10-09 23:58:35.157748 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.299625ms) to execute
2021-10-09 23:58:36.025149 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:37.328935 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.605497189s) to execute
2021-10-09 23:58:39.424269 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.869848448s) to execute
2021-10-09 23:58:39.554935 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.801912ms) to execute
2021-10-09 23:58:39.655788 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (132.388863ms) to execute
2021-10-09 23:58:40.957823 I | auth: deleting token XqsJionoNozpNPnZ.1166 for user conductor
2021-10-09 23:58:40.957873 I | auth: deleting token SsSuohWUTMAbPGHK.1167 for user conductor
2021-10-09 23:58:40.957884 I | auth: deleting token AWoGHzBFVYsLXxbE.1165 for user conductor
2021-10-09 23:58:40.957892 I | auth: deleting token pKwPewsPnRobcjMf.1168 for user conductor
2021-10-09 23:58:41.025451 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:41.957750 I | auth: deleting token uAuHXQzFJPLmMqrn.1169 for user conductor
2021-10-09 23:58:43.424836 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.970043909s) to execute
2021-10-09 23:58:44.023096 I | auth: deleting token nrSFbIsLhdXzHLBT.1171 for user conductor
2021-10-09 23:58:44.023148 I | auth: deleting token jxcofrbAOuULGgfZ.1170 for user conductor
2021-10-09 23:58:45.424165 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900733556s) to execute
2021-10-09 23:58:46.023104 I | auth: deleting token FHWggfMfdLwxsHva.1172 for user conductor
2021-10-09 23:58:46.025602 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:47.328376 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.901164464s) to execute
2021-10-09 23:58:48.957745 I | auth: deleting token cUIWoJSpXJMaIfQA.1173 for user conductor
2021-10-09 23:58:49.325687 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.798224049s) to execute
2021-10-09 23:58:49.325903 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (3.888029429s) to execute
2021-10-09 23:58:51.123269 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:51.428680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.099951862s) to execute
2021-10-09 23:58:51.428989 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.100610578s) to execute
2021-10-09 23:58:51.957705 I | auth: deleting token WbaMCWcjQsmfIJUR.1174 for user conductor
2021-10-09 23:58:51.957746 I | auth: deleting token lAVTINKgFhaieeIv.1175 for user conductor
2021-10-09 23:58:53.623674 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.200215335s) to execute
2021-10-09 23:58:53.624087 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.097960939s) to execute
2021-10-09 23:58:53.624272 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.100844968s) to execute
2021-10-09 23:58:54.023205 I | auth: deleting token VykWLAKBVQQcvXDq.1178 for user conductor
2021-10-09 23:58:54.023264 I | auth: deleting token rQucVNnVVPGsJZKt.1177 for user conductor
2021-10-09 23:58:55.723827 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.998966822s) to execute
2021-10-09 23:58:55.724174 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.097195119s) to execute
2021-10-09 23:58:56.123577 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:58:56.957780 I | auth: deleting token qsQjZzXyHlmGpiJp.1180 for user conductor
2021-10-09 23:58:58.027903 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.204489186s) to execute
2021-10-09 23:58:58.028076 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.202474469s) to execute
2021-10-09 23:58:58.028232 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.300772963s) to execute
2021-10-09 23:58:59.924831 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.892750992s) to execute
2021-10-09 23:59:01.123813 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:01.531120 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.587324458s) to execute
2021-10-09 23:59:01.531276 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.507942065s) to execute
2021-10-09 23:59:02.957845 I | auth: deleting token ePsrMALxQIzCoYXV.1184 for user conductor
2021-10-09 23:59:02.957930 I | auth: deleting token BfqXoRasiFBxnODC.1181 for user conductor
2021-10-09 23:59:02.957950 I | auth: deleting token tzJBtijOJfFnhEOV.1183 for user conductor
2021-10-09 23:59:02.957964 I | auth: deleting token KaMqMGrHgECKPVTm.1185 for user conductor
2021-10-09 23:59:02.957982 I | auth: deleting token ufNqazYlmGuqhjhZ.1182 for user conductor
2021-10-09 23:59:02.958000 I | auth: deleting token oYAJKQPVooMczGsz.1186 for user conductor
2021-10-09 23:59:03.726139 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.071925724s) to execute
2021-10-09 23:59:03.823246 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.199803469s) to execute
2021-10-09 23:59:03.954712 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (200.829586ms) to execute
2021-10-09 23:59:05.023143 I | auth: deleting token DwGTKeaOVvkWayah.1187 for user conductor
2021-10-09 23:59:05.824206 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (669.665731ms) to execute
2021-10-09 23:59:05.957872 I | auth: deleting token tBLyPkOZJmLIJLAm.1188 for user conductor
2021-10-09 23:59:06.124227 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:07.957744 I | auth: deleting token scxiZbolspIRGsQd.1189 for user conductor
2021-10-09 23:59:08.054484 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (197.859456ms) to execute
2021-10-09 23:59:08.958991 I | auth: deleting token wPYiBJcNfzyeBAPy.1190 for user conductor
2021-10-09 23:59:09.957752 I | auth: deleting token bLkItUbCuRAqboji.1191 for user conductor
2021-10-09 23:59:10.957696 I | auth: deleting token JokZDBhcPRdjTxus.1192 for user conductor
2021-10-09 23:59:11.124528 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:12.957671 I | auth: deleting token TeQcQInWvroMDNQd.1193 for user conductor
2021-10-09 23:59:14.968873 I | auth: deleting token DoBwlStehlVZCTjY.1194 for user conductor
2021-10-09 23:59:16.124728 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:17.026454 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.802998901s) to execute
2021-10-09 23:59:19.229008 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (974.664298ms) to execute
2021-10-09 23:59:20.957794 I | auth: deleting token msPxfwLkBgIhIjol.1197 for user conductor
2021-10-09 23:59:20.957840 I | auth: deleting token VjvspQKSgrRFfvwP.1195 for user conductor
2021-10-09 23:59:20.957852 I | auth: deleting token wtDsKPTkDXAiubvY.1199 for user conductor
2021-10-09 23:59:20.957858 I | auth: deleting token ZFZhWUYdBjWgpego.1196 for user conductor
2021-10-09 23:59:20.957865 I | auth: deleting token cOVEUqFomusDgSuV.1198 for user conductor
2021-10-09 23:59:21.223197 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:23.127552 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.704230907s) to execute
2021-10-09 23:59:23.255880 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.06765ms) to execute
2021-10-09 23:59:23.354789 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (129.081896ms) to execute
2021-10-09 23:59:24.957903 I | auth: deleting token sdkeEJFfdzJyjIoh.1200 for user conductor
2021-10-09 23:59:25.123431 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.468948652s) to execute
2021-10-09 23:59:26.223479 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:26.927133 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.703865367s) to execute
2021-10-09 23:59:29.023079 I | auth: deleting token csHNDuVpaTimClqy.1203 for user conductor
2021-10-09 23:59:29.023143 I | auth: deleting token ZcPKKOYuaupPMxfZ.1206 for user conductor
2021-10-09 23:59:29.023161 I | auth: deleting token UqfKVAhnFRxGhvOO.1204 for user conductor
2021-10-09 23:59:29.023178 I | auth: deleting token xDXPJWmwUFbMvVDe.1202 for user conductor
2021-10-09 23:59:29.023189 I | auth: deleting token rsPKHxlJPPBUElwy.1201 for user conductor
2021-10-09 23:59:29.023198 I | auth: deleting token nTAhdjvTwMArmnaS.1205 for user conductor
2021-10-09 23:59:30.929580 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.904527781s) to execute
2021-10-09 23:59:30.929828 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.999724144s) to execute
2021-10-09 23:59:30.957810 I | auth: deleting token fMpyOjDbovVLSsSP.1207 for user conductor
2021-10-09 23:59:31.223783 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:33.023076 I | auth: deleting token ZhdfcxalSuKNktMv.1208 for user conductor
2021-10-09 23:59:33.023154 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.997350756s) to execute
2021-10-09 23:59:33.023379 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.999980326s) to execute
2021-10-09 23:59:33.023474 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.00000718s) to execute
2021-10-09 23:59:33.154454 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.883641ms) to execute
2021-10-09 23:59:35.023153 I | auth: deleting token tIVZDeKILEVatgxt.1209 for user conductor
2021-10-09 23:59:35.023204 I | auth: deleting token zMCdFKfZhfpChrDw.1211 for user conductor
2021-10-09 23:59:35.023213 I | auth: deleting token cHUPEDQQycALzQEy.1210 for user conductor
2021-10-09 23:59:36.224077 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:37.023182 I | auth: deleting token zgUjrNBxSfatBmui.1212 for user conductor
2021-10-09 23:59:37.023242 I | auth: deleting token pVfngFxSVvzFIQQY.1213 for user conductor
2021-10-09 23:59:37.227309 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.572952113s) to execute
2021-10-09 23:59:39.426950 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.071762977s) to execute
2021-10-09 23:59:39.427328 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.103962776s) to execute
2021-10-09 23:59:40.023265 I | auth: deleting token nFAqJLWYjyIuSlXn.1214 for user conductor
2021-10-09 23:59:41.224387 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:43.957702 I | auth: deleting token hTtgzAgosvKkxOBu.1218 for user conductor
2021-10-09 23:59:43.957742 I | auth: deleting token hkOCGxjwXgialJzU.1217 for user conductor
2021-10-09 23:59:43.957752 I | auth: deleting token bxCdQjyHRsWtjvnm.1216 for user conductor
2021-10-09 23:59:43.957759 I | auth: deleting token GEZEyOFfvHNcEqCH.1215 for user conductor
2021-10-09 23:59:44.930524 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (5.486566437s) to execute
2021-10-09 23:59:44.930890 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (5.40380418s) to execute
2021-10-09 23:59:44.931086 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.305072466s) to execute
2021-10-09 23:59:45.254705 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (230.570939ms) to execute
2021-10-09 23:59:45.257401 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (225.598938ms) to execute
2021-10-09 23:59:46.224605 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:47.957775 I | auth: deleting token FKDFNmcwDEuQcCFn.1222 for user conductor
2021-10-09 23:59:47.957842 I | auth: deleting token TzendClDKQICspuE.1220 for user conductor
2021-10-09 23:59:47.957853 I | auth: deleting token YOeQQQpmTaRmkcwe.1221 for user conductor
2021-10-09 23:59:47.957860 I | auth: deleting token gKAtzZpAxGejKkzN.1219 for user conductor
2021-10-09 23:59:48.927611 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.970632014s) to execute
2021-10-09 23:59:49.054492 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (124.225098ms) to execute
2021-10-09 23:59:49.957757 I | auth: deleting token YXqnZUqSPHZhXNzu.1223 for user conductor
2021-10-09 23:59:51.224903 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:52.023712 I | auth: deleting token LFfitHAMcTrahAuA.1224 for user conductor
2021-10-09 23:59:52.831870 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.177399934s) to execute
2021-10-09 23:59:52.957667 I | auth: deleting token xAwbKtzscMmpxXIF.1225 for user conductor
2021-10-09 23:59:53.957756 I | auth: deleting token rOPyNEgndYZaeQju.1226 for user conductor
2021-10-09 23:59:56.225145 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-09 23:59:57.023087 I | auth: deleting token LMFFiNLVvtrHnLKE.1227 for user conductor
2021-10-09 23:59:58.957802 I | auth: deleting token GoFplsdImDEQxuwa.1229 for user conductor
2021-10-09 23:59:58.957896 I | auth: deleting token qytwYqiSiAQNZwXn.1228 for user conductor
2021-10-10 00:00:01.023203 I | auth: deleting token LfPDxWFDVEJRTDdf.1230 for user conductor
2021-10-10 00:00:01.225543 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:01.957745 I | auth: deleting token OBAACcsPehywQTGr.1231 for user conductor
2021-10-10 00:00:01.957795 I | auth: deleting token kuJAiLmCnuohzZyR.1233 for user conductor
2021-10-10 00:00:01.957803 I | auth: deleting token OvvGLywKtYvatFrK.1232 for user conductor
2021-10-10 00:00:02.127679 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.898483537s) to execute
2021-10-10 00:00:03.832054 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.508729044s) to execute
2021-10-10 00:00:03.832431 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.702014642s) to execute
2021-10-10 00:00:04.025398 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.894901422s) to execute
2021-10-10 00:00:04.025766 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.894960485s) to execute
2021-10-10 00:00:06.023139 I | auth: deleting token owjNfMeIQsjBqzJp.1234 for user conductor
2021-10-10 00:00:06.023216 I | auth: deleting token wLMTQqPnaTHvrusH.1235 for user conductor
2021-10-10 00:00:06.023239 I | auth: deleting token jrohJZHsmbjNaUXj.1236 for user conductor
2021-10-10 00:00:06.224288 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.30072462s) to execute
2021-10-10 00:00:06.224401 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.197847189s) to execute
2021-10-10 00:00:06.323225 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:08.023195 I | auth: deleting token eEIVKRXfRPFKAcXs.1237 for user conductor
2021-10-10 00:00:08.032080 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.677583676s) to execute
2021-10-10 00:00:10.031138 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.9079227s) to execute
2021-10-10 00:00:10.031303 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.808035858s) to execute
2021-10-10 00:00:10.155143 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (121.583849ms) to execute
2021-10-10 00:00:10.957811 I | auth: deleting token evEUxTHkYGxyrrqA.1238 for user conductor
2021-10-10 00:00:11.323498 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:14.023180 I | auth: deleting token bWhUqcYagKpljQFA.1240 for user conductor
2021-10-10 00:00:14.325773 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.868798761s) to execute
2021-10-10 00:00:14.554884 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (127.317993ms) to execute
2021-10-10 00:00:14.957763 I | auth: deleting token ZIzTxFbBywDxQMnO.1239 for user conductor
2021-10-10 00:00:14.957840 I | auth: deleting token QBeoiTVLYtMxlDNk.1241 for user conductor
2021-10-10 00:00:16.324572 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:18.423355 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.068990379s) to execute
2021-10-10 00:00:18.555539 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.998094ms) to execute
2021-10-10 00:00:18.957837 I | auth: deleting token oLoLLlnSOBXjMIHI.1242 for user conductor
2021-10-10 00:00:18.957900 I | auth: deleting token OKhCwwJeVRUHIdgj.1243 for user conductor
2021-10-10 00:00:18.957923 I | auth: deleting token FdgBrrEaqYJmrlqw.1244 for user conductor
2021-10-10 00:00:20.957672 I | auth: deleting token ioOkwHPmRdOHnKRQ.1245 for user conductor
2021-10-10 00:00:21.230534 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (775.331244ms) to execute
2021-10-10 00:00:21.324930 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:23.023153 I | auth: deleting token xCasOzlUgRfhJATj.1247 for user conductor
2021-10-10 00:00:23.023238 I | auth: deleting token ohTiTbwYBycTwxdY.1246 for user conductor
2021-10-10 00:00:23.524668 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (401.346009ms) to execute
2021-10-10 00:00:23.754500 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (131.384913ms) to execute
2021-10-10 00:00:23.957820 I | auth: deleting token ypQhsPepMahCGpih.1249 for user conductor
2021-10-10 00:00:23.957863 I | auth: deleting token BOwZWMltJMrPzmGd.1248 for user conductor
2021-10-10 00:00:23.957888 I | auth: deleting token uhIsiwhtmmaNUHpS.1250 for user conductor
2021-10-10 00:00:26.325320 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:27.957826 I | auth: deleting token JfZpAQzCiBTJqcNM.1252 for user conductor
2021-10-10 00:00:29.957730 I | auth: deleting token oODLnwbeGuVNyijZ.1251 for user conductor
2021-10-10 00:00:29.957783 I | auth: deleting token msacIyfzVVUULXyt.1255 for user conductor
2021-10-10 00:00:29.957797 I | auth: deleting token lGPuiqIGvDfWFUVd.1254 for user conductor
2021-10-10 00:00:29.957806 I | auth: deleting token IPUFqHVYjElzHnYB.1253 for user conductor
2021-10-10 00:00:31.325652 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:33.023094 I | auth: deleting token uVjRNXlHxEqRzbvj.1256 for user conductor
2021-10-10 00:00:35.957714 I | auth: deleting token sTrQIhPfNyYXmDAl.1257 for user conductor
2021-10-10 00:00:36.326012 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:37.957838 I | auth: deleting token GfddTUJWaLyvImwk.1258 for user conductor
2021-10-10 00:00:39.224585 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.870069908s) to execute
2021-10-10 00:00:40.023228 I | auth: deleting token CQdpdkIPBGLKPJhh.1259 for user conductor
2021-10-10 00:00:41.023296 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.794245948s) to execute
2021-10-10 00:00:41.023526 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.795850033s) to execute
2021-10-10 00:00:41.027216 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.799490891s) to execute
2021-10-10 00:00:41.027525 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.799809236s) to execute
2021-10-10 00:00:41.124933 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (100.136216ms) to execute
2021-10-10 00:00:41.326338 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:43.957720 I | auth: deleting token MQQLySKdJHVRNJXt.1260 for user conductor
2021-10-10 00:00:43.957779 I | auth: deleting token WxsMnDuLOFOKfrVW.1261 for user conductor
2021-10-10 00:00:46.023195 I | auth: deleting token XToFXJGWLUXiNeTj.1263 for user conductor
2021-10-10 00:00:46.023245 I | auth: deleting token DHrIZphSRDnaqRJw.1264 for user conductor
2021-10-10 00:00:46.023256 I | auth: deleting token YJAwLGIlFpYIGJAZ.1262 for user conductor
2021-10-10 00:00:46.326571 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:50.631338 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.501980504s) to execute
2021-10-10 00:00:50.823912 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (189.232821ms) to execute
2021-10-10 00:00:50.826860 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (192.114818ms) to execute
2021-10-10 00:00:50.827142 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (192.217798ms) to execute
2021-10-10 00:00:51.326839 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:51.957781 I | auth: deleting token vFBHTCvBLJhJUiND.1265 for user conductor
2021-10-10 00:00:51.957848 I | auth: deleting token NrbEMGEZcENRSmfR.1266 for user conductor
2021-10-10 00:00:51.957863 I | auth: deleting token CeKmQJrdGkDRHNWu.1268 for user conductor
2021-10-10 00:00:51.957876 I | auth: deleting token sFWWwjNtEeUgwjzI.1269 for user conductor
2021-10-10 00:00:51.957891 I | auth: deleting token hqZYAKVcNapHXYNs.1267 for user conductor
2021-10-10 00:00:53.957973 I | auth: deleting token VuMXEOsBpqUciPWc.1270 for user conductor
2021-10-10 00:00:56.327254 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:00:56.928498 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.674251926s) to execute
2021-10-10 00:00:57.023145 I | auth: deleting token BtjkxRxLkfMjPaSH.1271 for user conductor
2021-10-10 00:00:59.023194 I | auth: deleting token TNHMLWOylfySEkDB.1272 for user conductor
2021-10-10 00:01:00.932407 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.808821714s) to execute
2021-10-10 00:01:00.933241 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.001995362s) to execute
2021-10-10 00:01:00.933596 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (4.002079684s) to execute
2021-10-10 00:01:01.155625 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (132.097024ms) to execute
2021-10-10 00:01:01.225362 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (186.314535ms) to execute
2021-10-10 00:01:01.423420 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:01.957801 I | auth: deleting token OOdfKFJOclEToNyv.1273 for user conductor
2021-10-10 00:01:04.957748 I | auth: deleting token OVZHoOAaOeeXHuwL.1274 for user conductor
2021-10-10 00:01:06.423762 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:08.023145 I | auth: deleting token VlxFyQbdUVRPRIgU.1275 for user conductor
2021-10-10 00:01:08.124858 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.469678069s) to execute
2021-10-10 00:01:09.957748 I | auth: deleting token YMwwOJdsaWbEnhjj.1276 for user conductor
2021-10-10 00:01:09.957816 I | auth: deleting token WhxCAdrjsCdVUSuk.1277 for user conductor
2021-10-10 00:01:10.326577 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.069442544s) to execute
2021-10-10 00:01:10.326680 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (572.359337ms) to execute
2021-10-10 00:01:10.957830 I | auth: deleting token WDQgXymwIiFIUIAz.1278 for user conductor
2021-10-10 00:01:11.424226 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:13.023192 I | auth: deleting token HxElvgarHlMXVVvJ.1279 for user conductor
2021-10-10 00:01:13.226041 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (771.298552ms) to execute
2021-10-10 00:01:14.957812 I | auth: deleting token dDRUTubYkmlhXedH.1280 for user conductor
2021-10-10 00:01:16.424571 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:17.957869 I | auth: deleting token BmTNXcxRyYSXnPLs.1282 for user conductor
2021-10-10 00:01:18.957776 I | auth: deleting token cQhaGbEIKldfsevc.1284 for user conductor
2021-10-10 00:01:18.957832 I | auth: deleting token zqjNRZgWVwuaQLFX.1283 for user conductor
2021-10-10 00:01:18.957844 I | auth: deleting token LklEvdWpgdDfhbEY.1281 for user conductor
2021-10-10 00:01:19.957854 I | auth: deleting token PLSpuGWzOqIkDLKz.1285 for user conductor
2021-10-10 00:01:21.523176 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:24.025806 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102447185s) to execute
2021-10-10 00:01:25.023298 I | auth: deleting token nlQEuTIKnRnPelcB.1291 for user conductor
2021-10-10 00:01:25.023372 I | auth: deleting token BbZzWDNutDgNpkHT.1289 for user conductor
2021-10-10 00:01:25.023391 I | auth: deleting token lECHIimqkTkYHzFQ.1288 for user conductor
2021-10-10 00:01:25.023412 I | auth: deleting token ROSRFllkwtGpYzgL.1290 for user conductor
2021-10-10 00:01:25.023430 I | auth: deleting token YLddxFnnTboQRxzn.1287 for user conductor
2021-10-10 00:01:26.523452 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:26.957720 I | auth: deleting token zDznqlmKspyypXcz.1293 for user conductor
2021-10-10 00:01:27.826375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.402831886s) to execute
2021-10-10 00:01:28.957734 I | auth: deleting token DRKrGzfWMfwODaaH.1294 for user conductor
2021-10-10 00:01:28.957795 I | auth: deleting token bxVCNmELynrKQaZi.1296 for user conductor
2021-10-10 00:01:28.957812 I | auth: deleting token ODDbsXKUmsTnXnfM.1295 for user conductor
2021-10-10 00:01:31.523821 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:31.957735 I | auth: deleting token xDurQYVjxXBBGPnM.1297 for user conductor
2021-10-10 00:01:31.957799 I | auth: deleting token tMlyPDQoQHrqPryF.1298 for user conductor
2021-10-10 00:01:33.429547 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.504651304s) to execute
2021-10-10 00:01:33.523490 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.695006903s) to execute
2021-10-10 00:01:33.957744 I | auth: deleting token YOqIZkfCvQoBqGth.1299 for user conductor
2021-10-10 00:01:34.957764 I | auth: deleting token EIvECPpKpjKPkCSu.1300 for user conductor
2021-10-10 00:01:35.725786 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.102160998s) to execute
2021-10-10 00:01:36.524136 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:36.957783 I | auth: deleting token VUUrXMSWrYyGJQao.1301 for user conductor
2021-10-10 00:01:39.623640 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.76927612s) to execute
2021-10-10 00:01:39.957734 I | auth: deleting token UAloSViNGvUwRLDt.1302 for user conductor
2021-10-10 00:01:40.957777 I | auth: deleting token eOUsjYgCuYIKZbVx.1303 for user conductor
2021-10-10 00:01:41.427537 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.673007116s) to execute
2021-10-10 00:01:41.431323 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.707384046s) to execute
2021-10-10 00:01:41.523205 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.799751536s) to execute
2021-10-10 00:01:41.524459 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:43.528371 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.004825199s) to execute
2021-10-10 00:01:43.528577 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (2.097028317s) to execute
2021-10-10 00:01:44.957822 I | auth: deleting token EqiKuFQZPLTBnKxb.1305 for user conductor
2021-10-10 00:01:45.530158 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.903649184s) to execute
2021-10-10 00:01:45.530321 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.906726405s) to execute
2021-10-10 00:01:46.524673 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:47.023682 I | auth: deleting token ucHyArCNSfUMWKED.1307 for user conductor
2021-10-10 00:01:47.023742 I | auth: deleting token LYQPFNShIUfKxwfF.1308 for user conductor
2021-10-10 00:01:47.023768 I | auth: deleting token kWfdbSrnNOgkWxwX.1309 for user conductor
2021-10-10 00:01:47.023782 I | auth: deleting token ymLgBWLTZKXfrBLX.1306 for user conductor
2021-10-10 00:01:47.023800 I | auth: deleting token CBEAUaMfAsHJCczk.1304 for user conductor
2021-10-10 00:01:47.629311 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.003165152s) to execute
2021-10-10 00:01:48.957779 I | auth: deleting token bbnRKOESRhdelVqn.1310 for user conductor
2021-10-10 00:01:49.428004 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.702221933s) to execute
2021-10-10 00:01:49.428149 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.801706555s) to execute
2021-10-10 00:01:49.428269 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.796762847s) to execute
2021-10-10 00:01:49.655233 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (131.706859ms) to execute
2021-10-10 00:01:49.957751 I | auth: deleting token wvNxalWTaOlLMiSh.1311 for user conductor
2021-10-10 00:01:50.957898 I | auth: deleting token PAxkajSSeXpGRWjW.1312 for user conductor
2021-10-10 00:01:51.231407 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.673696178s) to execute
2021-10-10 00:01:51.524905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:51.957806 I | auth: deleting token dKVWZJSTPFeWUGrW.1313 for user conductor
2021-10-10 00:01:53.225292 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.370584569s) to execute
2021-10-10 00:01:53.957777 I | auth: deleting token VjFjqmXuucglmFoc.1315 for user conductor
2021-10-10 00:01:53.957829 I | auth: deleting token gmXPZZDutjKpGSKF.1314 for user conductor
2021-10-10 00:01:55.957747 I | auth: deleting token smpldihznhHbGwqi.1316 for user conductor
2021-10-10 00:01:56.525162 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:01:56.925403 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.601832512s) to execute
2021-10-10 00:01:56.925794 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.697319911s) to execute
2021-10-10 00:01:59.022993 I | auth: deleting token SjDyESmGDyIRZnSE.1317 for user conductor
2021-10-10 00:01:59.331310 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.206848523s) to execute
2021-10-10 00:01:59.331493 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.403822852s) to execute
2021-10-10 00:01:59.423327 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.491254244s) to execute
2021-10-10 00:02:01.023003 I | auth: deleting token OHfAtctnSNSDpeFR.1318 for user conductor
2021-10-10 00:02:01.525620 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:02.331062 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (607.307629ms) to execute
2021-10-10 00:02:04.023162 I | auth: deleting token EpQbhikVXnEyaZXJ.1320 for user conductor
2021-10-10 00:02:04.430731 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (105.906359ms) to execute
2021-10-10 00:02:06.525912 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:07.023343 I | auth: deleting token mkFgeQHocEciDydY.1321 for user conductor
2021-10-10 00:02:07.523703 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (669.293516ms) to execute
2021-10-10 00:02:08.957753 I | auth: deleting token vnlbktWIFryqEBdz.1322 for user conductor
2021-10-10 00:02:11.526206 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:12.023235 I | auth: deleting token mvnxpafavjMcfVVf.1323 for user conductor
2021-10-10 00:02:14.026374 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.002900474s) to execute
2021-10-10 00:02:15.957819 I | auth: deleting token FfHXfoUktMhwtmNE.1326 for user conductor
2021-10-10 00:02:15.957868 I | auth: deleting token eTvdGKZLFiNWHCsE.1324 for user conductor
2021-10-10 00:02:16.526503 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:17.957802 I | auth: deleting token leHiwyQaDWWxSpXi.1328 for user conductor
2021-10-10 00:02:18.226266 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.000179595s) to execute
2021-10-10 00:02:18.354653 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (125.57974ms) to execute
2021-10-10 00:02:21.526797 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:21.957766 I | auth: deleting token RyAAxjaznTeaeNLO.1329 for user conductor
2021-10-10 00:02:21.957853 I | auth: deleting token lbCbRGeZIHJuGTrQ.1331 for user conductor
2021-10-10 00:02:23.330797 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.676297202s) to execute
2021-10-10 00:02:23.957829 I | auth: deleting token domxnNPUTcbKkzXC.1332 for user conductor
2021-10-10 00:02:23.957891 I | auth: deleting token NzfHlMqxKxLvrCNA.1334 for user conductor
2021-10-10 00:02:23.957907 I | auth: deleting token LSoaNzfLSxGiMTki.1330 for user conductor
2021-10-10 00:02:25.957801 I | auth: deleting token rxjtBGUSTQAWVmum.1335 for user conductor
2021-10-10 00:02:26.527200 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:28.524792 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.0014011s) to execute
2021-10-10 00:02:30.623328 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.899854063s) to execute
2021-10-10 00:02:30.623492 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (900.115593ms) to execute
2021-10-10 00:02:31.527446 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:32.529301 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.855400184s) to execute
2021-10-10 00:02:33.957649 I | auth: deleting token RXmKSbbMYgxtvFrn.1336 for user conductor
2021-10-10 00:02:33.957800 I | auth: deleting token qPxnZSrUsuFelBaA.1337 for user conductor
2021-10-10 00:02:33.957839 I | auth: deleting token dInSbIbYGouNSDzl.1338 for user conductor
2021-10-10 00:02:33.957875 I | auth: deleting token kQmUGVQlWSCRbGec.1339 for user conductor
2021-10-10 00:02:33.957991 I | auth: deleting token UypVDkNIdjjpHrAd.1340 for user conductor
2021-10-10 00:02:34.923844 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.159669425s) to execute
2021-10-10 00:02:36.623101 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:39.126294 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.002596418s) to execute
2021-10-10 00:02:41.328619 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.105242617s) to execute
2021-10-10 00:02:41.623431 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:41.957790 I | auth: deleting token qQAKHlQGVDsaRLlp.1344 for user conductor
2021-10-10 00:02:41.957856 I | auth: deleting token CBmdueGhEqCjntpa.1342 for user conductor
2021-10-10 00:02:43.230668 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.102064865s) to execute
2021-10-10 00:02:43.230776 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.007374168s) to execute
2021-10-10 00:02:43.230885 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.707689215s) to execute
2021-10-10 00:02:43.230981 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.900161132s) to execute
2021-10-10 00:02:43.957773 I | auth: deleting token MJBhICFRjHOSKpmG.1347 for user conductor
2021-10-10 00:02:43.957831 I | auth: deleting token hrmaZlSdsWwZEnoG.1345 for user conductor
2021-10-10 00:02:43.957843 I | auth: deleting token NlQQgZLnRgbHIeOG.1346 for user conductor
2021-10-10 00:02:43.957854 I | auth: deleting token cxPESbFDUUSoPacd.1341 for user conductor
2021-10-10 00:02:43.957868 I | auth: deleting token PAjMvmejMtCedVSi.1343 for user conductor
2021-10-10 00:02:45.625308 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.29620407s) to execute
2021-10-10 00:02:46.623724 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:47.727152 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.072838734s) to execute
2021-10-10 00:02:48.957782 I | auth: deleting token QvogupQtqOlnTOPj.1349 for user conductor
2021-10-10 00:02:48.957850 I | auth: deleting token rjtgrRWzGItKjKnY.1350 for user conductor
2021-10-10 00:02:48.957866 I | auth: deleting token OmzNFAGKLNKceclS.1348 for user conductor
2021-10-10 00:02:51.023167 I | auth: deleting token jABuqqnxCEYrkhzI.1351 for user conductor
2021-10-10 00:02:51.624006 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:52.023166 I | auth: deleting token DjvVDuBCMeFpZvgq.1352 for user conductor
2021-10-10 00:02:52.331644 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.808170126s) to execute
2021-10-10 00:02:52.555799 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (127.494356ms) to execute
2021-10-10 00:02:53.023306 I | auth: deleting token vwPjGGPVaYmzKRnG.1353 for user conductor
2021-10-10 00:02:53.957833 I | auth: deleting token qGxGZRgbZbSXlzxk.1354 for user conductor
2021-10-10 00:02:56.624307 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:02:56.823635 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.269064437s) to execute
2021-10-10 00:02:56.957853 I | auth: deleting token dlpRkgnIezmrHLVK.1355 for user conductor
2021-10-10 00:02:58.957801 I | auth: deleting token cerKslnohrlLroLj.1358 for user conductor
2021-10-10 00:02:58.957858 I | auth: deleting token bPCIEYTxPZGaluxK.1357 for user conductor
2021-10-10 00:02:58.957868 I | auth: deleting token qzfunFjYSteZpfau.1356 for user conductor
2021-10-10 00:02:58.957879 I | auth: deleting token IOYlAYyFTKerNhZr.1359 for user conductor
2021-10-10 00:02:59.126293 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.867862604s) to execute
2021-10-10 00:03:00.923915 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.767044884s) to execute
2021-10-10 00:03:01.624636 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:02.023159 I | auth: deleting token CerUDQgFuaMfdnnx.1360 for user conductor
2021-10-10 00:03:03.957768 I | auth: deleting token bPoGIbGuaaZNLxRt.1361 for user conductor
2021-10-10 00:03:06.023250 I | auth: deleting token ynIIvLQYZDZetAJp.1363 for user conductor
2021-10-10 00:03:06.023329 I | auth: deleting token QHhWOaDbPjEUxjrM.1362 for user conductor
2021-10-10 00:03:06.427150 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.498964095s) to execute
2021-10-10 00:03:06.427914 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (5.500635981s) to execute
2021-10-10 00:03:06.723213 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:09.828234 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.771151244s) to execute
2021-10-10 00:03:10.054844 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.552156ms) to execute
2021-10-10 00:03:11.723683 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:13.424446 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.269987392s) to execute
2021-10-10 00:03:15.425884 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.96530136s) to execute
2021-10-10 00:03:16.723992 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:17.023138 I | auth: deleting token jwxZAkEwStVtEkhV.1365 for user conductor
2021-10-10 00:03:17.023206 I | auth: deleting token nUTdpiUCfzzOGdoP.1366 for user conductor
2021-10-10 00:03:17.023221 I | auth: deleting token cttDNxzUBAXwPEVE.1364 for user conductor
2021-10-10 00:03:17.023230 I | auth: deleting token NFzsbihISzFzrQCA.1367 for user conductor
2021-10-10 00:03:17.023245 I | auth: deleting token ScvzdXIunjNpckqE.1368 for user conductor
2021-10-10 00:03:17.329723 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.899058796s) to execute
2021-10-10 00:03:17.329902 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.901599975s) to execute
2021-10-10 00:03:17.554467 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (131.004266ms) to execute
2021-10-10 00:03:19.727476 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.273182112s) to execute
2021-10-10 00:03:21.526879 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.770467893s) to execute
2021-10-10 00:03:21.724272 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:22.957730 I | auth: deleting token uoGlnWnMWvGpdBVC.1373 for user conductor
2021-10-10 00:03:22.957814 I | auth: deleting token csxdbpnqzoWbMIRY.1374 for user conductor
2021-10-10 00:03:22.957829 I | auth: deleting token vxJVEZVyzWKJiRuR.1369 for user conductor
2021-10-10 00:03:22.957842 I | auth: deleting token phpLVALXSRhykPjI.1370 for user conductor
2021-10-10 00:03:22.957850 I | auth: deleting token VYCyutrNdYRxVSGc.1371 for user conductor
2021-10-10 00:03:25.023078 I | auth: deleting token vCKBpyshIKOvpWfm.1375 for user conductor
2021-10-10 00:03:25.525635 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100057355s) to execute
2021-10-10 00:03:26.724563 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:27.023057 I | auth: deleting token swWgZNozjuUIFxnp.1376 for user conductor
2021-10-10 00:03:27.023122 I | auth: deleting token MvRikQshTGOxThJU.1378 for user conductor
2021-10-10 00:03:27.023130 I | auth: deleting token oaEsMATGigPYJcsq.1377 for user conductor
2021-10-10 00:03:28.957866 I | auth: deleting token pGNkjjfImpINxjOg.1379 for user conductor
2021-10-10 00:03:29.227168 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.502198573s) to execute
2021-10-10 00:03:29.227960 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (3.699521198s) to execute
2021-10-10 00:03:31.724795 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:34.957825 I | auth: deleting token YAiWDPJHkYwEjXUN.1384 for user conductor
2021-10-10 00:03:34.957878 I | auth: deleting token QleJnaWcnxSTIuAk.1381 for user conductor
2021-10-10 00:03:35.957719 I | auth: deleting token bVdsnvMKQPHNxRnW.1382 for user conductor
2021-10-10 00:03:35.957784 I | auth: deleting token ygyQigyuxkscgrOR.1385 for user conductor
2021-10-10 00:03:35.957799 I | auth: deleting token rbeyGZftOGIkgaMS.1383 for user conductor
2021-10-10 00:03:36.725122 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:37.725363 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (7.398908616s) to execute
2021-10-10 00:03:38.023145 I | auth: deleting token ufKmAyJufmTrLFWY.1386 for user conductor
2021-10-10 00:03:39.531538 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.806012351s) to execute
2021-10-10 00:03:39.531739 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.786161733s) to execute
2021-10-10 00:03:39.754493 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (128.11924ms) to execute
2021-10-10 00:03:39.756863 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (128.413974ms) to execute
2021-10-10 00:03:40.023084 I | auth: deleting token NElxMEyZYPkwQzet.1388 for user conductor
2021-10-10 00:03:40.023158 I | auth: deleting token YdPoHDfIEjcBVfTk.1387 for user conductor
2021-10-10 00:03:40.023171 I | auth: deleting token oZbMKJEjHbcYcicx.1389 for user conductor
2021-10-10 00:03:41.725546 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:43.430090 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.706731395s) to execute
2021-10-10 00:03:44.024623 I | auth: deleting token aooUKjPDZgZYqxGO.1390 for user conductor
2021-10-10 00:03:44.024684 I | auth: deleting token IiuxkgmgLkkaKKIZ.1392 for user conductor
2021-10-10 00:03:45.326126 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.893339701s) to execute
2021-10-10 00:03:45.326375 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.572277605s) to execute
2021-10-10 00:03:45.455253 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (126.333423ms) to execute
2021-10-10 00:03:45.957701 I | auth: deleting token dKReFEuXIvdxVQYM.1391 for user conductor
2021-10-10 00:03:46.725909 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:50.023361 I | auth: deleting token JeKoxdjCXsWlvpYg.1393 for user conductor
2021-10-10 00:03:51.726191 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:51.957823 I | auth: deleting token gmfsjSvaHEWZaxZu.1394 for user conductor
2021-10-10 00:03:51.957893 I | auth: deleting token KmkoeAWrwUAjrrYR.1395 for user conductor
2021-10-10 00:03:52.926389 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.502853558s) to execute
2021-10-10 00:03:53.957759 I | auth: deleting token oBgRDBUAXUAkrRqo.1396 for user conductor
2021-10-10 00:03:54.926392 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.999513318s) to execute
2021-10-10 00:03:54.926710 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.997303895s) to execute
2021-10-10 00:03:55.957674 I | auth: deleting token zsIbWAyRJdMQTzpJ.1398 for user conductor
2021-10-10 00:03:55.957768 I | auth: deleting token rZuRYsLyKdhIrcvL.1399 for user conductor
2021-10-10 00:03:55.957789 I | auth: deleting token ewxdqCCEtXcriIvo.1397 for user conductor
2021-10-10 00:03:56.726484 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:03:59.023630 I | auth: deleting token LHULTBkSfRjItpah.1400 for user conductor
2021-10-10 00:04:00.125247 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.170489598s) to execute
2021-10-10 00:04:00.255226 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.067241ms) to execute
2021-10-10 00:04:00.355660 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (226.952092ms) to execute
2021-10-10 00:04:01.726719 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:01.957770 I | auth: deleting token VxqgUybrHcyynqRC.1401 for user conductor
2021-10-10 00:04:03.455528 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.501504ms) to execute
2021-10-10 00:04:03.957704 I | auth: deleting token VgWJUgOCREgBQhsr.1403 for user conductor
2021-10-10 00:04:03.957759 I | auth: deleting token BfOBsjESceONMVaZ.1402 for user conductor
2021-10-10 00:04:03.957771 I | auth: deleting token DfQWEcEDuubEGrAh.1404 for user conductor
2021-10-10 00:04:03.957784 I | auth: deleting token HspXpacshdoEPWbg.1405 for user conductor
2021-10-10 00:04:06.053475 I | auth: deleting token BxLejnxTWdGiPRBU.1406 for user conductor
2021-10-10 00:04:06.727031 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:07.023334 I | auth: deleting token HwhmDZKHEgTZLggV.1407 for user conductor
2021-10-10 00:04:07.732052 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.074547129s) to execute
2021-10-10 00:04:08.023223 I | auth: deleting token ALpfdkkXKnHFMebT.1409 for user conductor
2021-10-10 00:04:09.023188 I | auth: deleting token aDaOACdPVINRmDqj.1408 for user conductor
2021-10-10 00:04:10.023291 I | auth: deleting token CKoZGBVoUFWXJxyO.1410 for user conductor
2021-10-10 00:04:10.957785 I | auth: deleting token EazVAWMFINdmraEo.1411 for user conductor
2021-10-10 00:04:11.331065 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.476364782s) to execute
2021-10-10 00:04:11.727319 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:14.023243 I | auth: deleting token oEjxohsXMpEapGtQ.1412 for user conductor
2021-10-10 00:04:16.824127 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:17.957798 I | auth: deleting token POeiPpgwPjnrePyc.1413 for user conductor
2021-10-10 00:04:17.957854 I | auth: deleting token AiLPEQOkncEGwCCX.1414 for user conductor
2021-10-10 00:04:17.957865 I | auth: deleting token JOEUBZTSjQkmBYbP.1415 for user conductor
2021-10-10 00:04:19.827240 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.703847489s) to execute
2021-10-10 00:04:20.024690 I | auth: deleting token iQUyVOzmIMgcADPA.1416 for user conductor
2021-10-10 00:04:21.824589 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:21.930870 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.100443476s) to execute
2021-10-10 00:04:21.931161 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.10173015s) to execute
2021-10-10 00:04:22.023447 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.193824765s) to execute
2021-10-10 00:04:22.023524 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.193568031s) to execute
2021-10-10 00:04:23.957753 I | auth: deleting token bgfQJyOPkYRADFMr.1419 for user conductor
2021-10-10 00:04:23.957796 I | auth: deleting token pNRQlYQyErKZeqbK.1420 for user conductor
2021-10-10 00:04:23.957812 I | auth: deleting token ovYJpHjiOuMZliMu.1417 for user conductor
2021-10-10 00:04:23.957822 I | auth: deleting token IrlLURTMxDkukwZJ.1418 for user conductor
2021-10-10 00:04:25.923598 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.197846838s) to execute
2021-10-10 00:04:25.957708 I | auth: deleting token NcShRAavLXPkTCoO.1421 for user conductor
2021-10-10 00:04:26.824882 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:27.023090 I | auth: deleting token kvntDmfiybkIlCUQ.1423 for user conductor
2021-10-10 00:04:28.126678 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (670.053082ms) to execute
2021-10-10 00:04:30.957750 I | auth: deleting token cCmMryoagUWPRgbQ.1422 for user conductor
2021-10-10 00:04:31.825153 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:32.354538 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.650491ms) to execute
2021-10-10 00:04:33.957762 I | auth: deleting token ljXLdSdyEStLhrjN.1425 for user conductor
2021-10-10 00:04:33.957805 I | auth: deleting token hQMqEkgVWpcxodBf.1427 for user conductor
2021-10-10 00:04:33.957819 I | auth: deleting token KPNXrssIzVvTzjXj.1424 for user conductor
2021-10-10 00:04:33.957830 I | auth: deleting token vmNcHoGZmgUmXYJe.1426 for user conductor
2021-10-10 00:04:36.531561 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (476.851039ms) to execute
2021-10-10 00:04:36.825375 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:37.957861 I | auth: deleting token gFNEmwMDhQPUlWrK.1428 for user conductor
2021-10-10 00:04:37.957941 I | auth: deleting token DGjepFXnhxxqAGMx.1430 for user conductor
2021-10-10 00:04:40.023165 I | auth: deleting token PhwtbFrANktVMJnY.1433 for user conductor
2021-10-10 00:04:40.023260 I | auth: deleting token HeJTeZTcfqBsDkph.1431 for user conductor
2021-10-10 00:04:40.023286 I | auth: deleting token DDpiadcRhzDCvgYF.1429 for user conductor
2021-10-10 00:04:40.023305 I | auth: deleting token UvvwxHYDpbxjnanM.1432 for user conductor
2021-10-10 00:04:40.725347 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.969064171s) to execute
2021-10-10 00:04:41.825710 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:45.026197 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.87188468s) to execute
2021-10-10 00:04:45.957749 I | auth: deleting token luinIAwpTRMmAXyD.1434 for user conductor
2021-10-10 00:04:45.957829 I | auth: deleting token QKOqPNHPhJIOEqEQ.1436 for user conductor
2021-10-10 00:04:45.957850 I | auth: deleting token OlMVGBAOQaRcxOyE.1435 for user conductor
2021-10-10 00:04:46.826030 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:48.957737 I | auth: deleting token WuvLQHMASLlIwhti.1438 for user conductor
2021-10-10 00:04:49.957748 I | auth: deleting token GNwoDhnIVzErIqKH.1439 for user conductor
2021-10-10 00:04:49.957800 I | auth: deleting token XPcbdexjhLeRWxMr.1437 for user conductor
2021-10-10 00:04:51.826385 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:04:52.957847 I | auth: deleting token rjezkDdcdehRNxkV.1441 for user conductor
2021-10-10 00:04:52.957936 I | auth: deleting token xudnZSEMCozUIxGv.1440 for user conductor
2021-10-10 00:04:52.957951 I | auth: deleting token ouKBWPSgDClBDCXL.1442 for user conductor
2021-10-10 00:04:53.957783 I | auth: deleting token wMGBNVZBiHJJIcQd.1443 for user conductor
2021-10-10 00:04:56.826742 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:01.827081 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:02.026659 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.066880037s) to execute
2021-10-10 00:05:02.957755 I | auth: deleting token qAKHYOWPTODCUARN.1445 for user conductor
2021-10-10 00:05:03.957769 I | auth: deleting token hbEXFPyxKrYNwHdG.1446 for user conductor
2021-10-10 00:05:04.957775 I | auth: deleting token AMOjmcjRdCHiUQsR.1449 for user conductor
2021-10-10 00:05:04.957846 I | auth: deleting token VTYweFoyfeEDNDEV.1444 for user conductor
2021-10-10 00:05:04.957856 I | auth: deleting token WsaKnSrCCBzHGtVn.1448 for user conductor
2021-10-10 00:05:04.957871 I | auth: deleting token rFpXAbmjIJBtIPyH.1447 for user conductor
2021-10-10 00:05:05.924720 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.370242482s) to execute
2021-10-10 00:05:06.827309 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:11.023294 I | auth: deleting token tWnbhMVMWVwQMVGH.1450 for user conductor
2021-10-10 00:05:11.023334 I | auth: deleting token hFsgicBShRezPrBc.1452 for user conductor
2021-10-10 00:05:11.023344 I | auth: deleting token bCMaSToidKwrFEbF.1453 for user conductor
2021-10-10 00:05:11.023368 I | auth: deleting token CARoMTJmfZRAyktg.1454 for user conductor
2021-10-10 00:05:11.023380 I | auth: deleting token rCcjYFTBJNHzCrtq.1451 for user conductor
2021-10-10 00:05:11.827584 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:11.931899 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (306.689884ms) to execute
2021-10-10 00:05:14.957799 I | auth: deleting token CruvnsNSzjFYKnYW.1455 for user conductor
2021-10-10 00:05:14.957872 I | auth: deleting token QqxsaiQUxguxkgLg.1456 for user conductor
2021-10-10 00:05:14.957901 I | auth: deleting token sFlHpVXHDeiXtnTs.1457 for user conductor
2021-10-10 00:05:16.827957 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:19.023148 I | auth: deleting token tiCfwxAkBzORHOgV.1458 for user conductor
2021-10-10 00:05:19.023195 I | auth: deleting token PgPhzujaHjzuqMNG.1460 for user conductor
2021-10-10 00:05:19.023218 I | auth: deleting token sTIfUbqWNgcZKYwX.1459 for user conductor
2021-10-10 00:05:19.023233 I | auth: deleting token ECRwiIwlhXEHpuUV.1461 for user conductor
2021-10-10 00:05:20.626232 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.571686754s) to execute
2021-10-10 00:05:21.828281 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:21.957634 I | auth: deleting token bWFjhZOARJAhTrCw.1462 for user conductor
2021-10-10 00:05:21.957676 I | auth: deleting token qkjIcxZaVrErcGRr.1463 for user conductor
2021-10-10 00:05:23.957759 I | auth: deleting token fLIUOzRtXetAqtKY.1464 for user conductor
2021-10-10 00:05:23.957820 I | auth: deleting token nfEDjkdhjELnhuhN.1465 for user conductor
2021-10-10 00:05:24.631507 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.808160989s) to execute
2021-10-10 00:05:25.957772 I | auth: deleting token zLXjagaKKdXzTJln.1466 for user conductor
2021-10-10 00:05:26.627068 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.903465559s) to execute
2021-10-10 00:05:26.627266 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.903701079s) to execute
2021-10-10 00:05:26.828634 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:28.624620 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (3.900934275s) to execute
2021-10-10 00:05:28.624745 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.898798107s) to execute
2021-10-10 00:05:28.624900 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.901619665s) to execute
2021-10-10 00:05:28.957763 I | auth: deleting token TmzYVAahxmjNXLuJ.1467 for user conductor
2021-10-10 00:05:30.523404 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.894812621s) to execute
2021-10-10 00:05:30.523594 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.896450373s) to execute
2021-10-10 00:05:31.023132 I | auth: deleting token fHdChjSjzXwiZQuH.1468 for user conductor
2021-10-10 00:05:31.923223 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:36.629986 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.103852054s) to execute
2021-10-10 00:05:36.923729 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:39.957776 I | auth: deleting token zycCyjMmszUYLRtH.1470 for user conductor
2021-10-10 00:05:39.957854 I | auth: deleting token jewdqETSXmJfhTBF.1472 for user conductor
2021-10-10 00:05:40.726645 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.803432786s) to execute
2021-10-10 00:05:41.924123 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:42.023280 I | auth: deleting token NbKrUuHxrRWrrvrT.1473 for user conductor
2021-10-10 00:05:42.023337 I | auth: deleting token vdqviTCiKTghQHpS.1469 for user conductor
2021-10-10 00:05:42.023360 I | auth: deleting token ZGYEhIOEybJgObiF.1475 for user conductor
2021-10-10 00:05:42.023372 I | auth: deleting token eKZTyhtYWpYpCRGM.1471 for user conductor
2021-10-10 00:05:42.023386 I | auth: deleting token vfXzfwHOdLoiErQm.1474 for user conductor
2021-10-10 00:05:42.631219 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.076759137s) to execute
2021-10-10 00:05:44.929126 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.105667387s) to execute
2021-10-10 00:05:46.924428 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:46.926990 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.901120193s) to execute
2021-10-10 00:05:46.927631 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.995987295s) to execute
2021-10-10 00:05:47.054734 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (124.538327ms) to execute
2021-10-10 00:05:50.957858 I | auth: deleting token gLgRragtlwOZPCvL.1480 for user conductor
2021-10-10 00:05:50.957917 I | auth: deleting token NLAyADwBEkRYmprz.1476 for user conductor
2021-10-10 00:05:50.957933 I | auth: deleting token HiZgtjMPDDxAorKG.1477 for user conductor
2021-10-10 00:05:50.957944 I | auth: deleting token ScUgjnhmHtAgQBDx.1479 for user conductor
2021-10-10 00:05:50.957954 I | auth: deleting token ZJxledOOsveJsaKn.1478 for user conductor
2021-10-10 00:05:51.224974 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.970173261s) to execute
2021-10-10 00:05:51.924672 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:53.228309 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.803441461s) to execute
2021-10-10 00:05:53.228502 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.000840262s) to execute
2021-10-10 00:05:55.231180 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.807904111s) to execute
2021-10-10 00:05:55.231499 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.908051325s) to execute
2021-10-10 00:05:55.424931 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (190.639171ms) to execute
2021-10-10 00:05:56.924970 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:05:56.957811 I | auth: deleting token HtxFJsFDUWqdiZdY.1484 for user conductor
2021-10-10 00:05:56.957854 I | auth: deleting token cCnYTNZMEFKGQYeU.1482 for user conductor
2021-10-10 00:05:58.426779 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.471532867s) to execute
2021-10-10 00:06:00.429497 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (806.339725ms) to execute
2021-10-10 00:06:01.022954 I | auth: deleting token nOGhCOmwGzKZjdXG.1483 for user conductor
2021-10-10 00:06:01.023041 I | auth: deleting token cIIfYSfEmfgcTEuD.1481 for user conductor
2021-10-10 00:06:01.925309 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:01.957789 I | auth: deleting token rtOJAogRhEWTnYBn.1486 for user conductor
2021-10-10 00:06:01.957850 I | auth: deleting token RcxMuDZaaZmWlnpL.1485 for user conductor
2021-10-10 00:06:01.957873 I | auth: deleting token npVALUvcKQPCQuJt.1487 for user conductor
2021-10-10 00:06:02.426588 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.803359086s) to execute
2021-10-10 00:06:02.554678 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.166539ms) to execute
2021-10-10 00:06:06.829769 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.275328234s) to execute
2021-10-10 00:06:06.925647 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:08.957785 I | auth: deleting token qEFxZAblzIgdbATB.1490 for user conductor
2021-10-10 00:06:08.957829 I | auth: deleting token HkejNRwzNQNaCHmf.1489 for user conductor
2021-10-10 00:06:08.957837 I | auth: deleting token VALOZHUFScZuIrCt.1491 for user conductor
2021-10-10 00:06:08.957843 I | auth: deleting token hCjigvqNUiCHWzZR.1488 for user conductor
2021-10-10 00:06:08.957851 I | auth: deleting token TSQBJrsWjgORTfuI.1492 for user conductor
2021-10-10 00:06:09.125592 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.102314788s) to execute
2021-10-10 00:06:09.125791 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.202387097s) to execute
2021-10-10 00:06:11.023043 I | auth: deleting token fhOcdAeThfXiZgDn.1494 for user conductor
2021-10-10 00:06:11.023101 I | auth: deleting token vfymPgWPzxqYWegu.1493 for user conductor
2021-10-10 00:06:11.925933 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:13.127380 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.983861724s) to execute
2021-10-10 00:06:13.127672 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (3.999821055s) to execute
2021-10-10 00:06:14.023076 I | auth: deleting token ThRwCxHRrdddcPyi.1495 for user conductor
2021-10-10 00:06:14.023129 I | auth: deleting token mjJuQcTfvJHKPzmW.1496 for user conductor
2021-10-10 00:06:15.023070 I | auth: deleting token DDSIZfDhqcPpgCAR.1497 for user conductor
2021-10-10 00:06:15.226585 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.00316205s) to execute
2021-10-10 00:06:15.226779 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.096706584s) to execute
2021-10-10 00:06:15.226981 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.097577852s) to execute
2021-10-10 00:06:16.926423 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:17.124230 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.800882899s) to execute
2021-10-10 00:06:17.124464 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.895650445s) to execute
2021-10-10 00:06:17.957776 I | auth: deleting token WnhuXvAfSwUMGqFY.1498 for user conductor
2021-10-10 00:06:19.326686 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.19919907s) to execute
2021-10-10 00:06:19.326884 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (2.103532175s) to execute
2021-10-10 00:06:19.326975 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.171774751s) to execute
2021-10-10 00:06:19.957765 I | auth: deleting token GlrjMpvzTnVtJOcO.1499 for user conductor
2021-10-10 00:06:21.926939 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:23.125910 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.871877871s) to execute
2021-10-10 00:06:23.354623 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.272861ms) to execute
2021-10-10 00:06:23.454433 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (197.405147ms) to execute
2021-10-10 00:06:24.957799 I | auth: deleting token kAWEiIEPetyTztcM.1501 for user conductor
2021-10-10 00:06:24.957881 I | auth: deleting token RhtBaNBjcllcoEru.1502 for user conductor
2021-10-10 00:06:24.957900 I | auth: deleting token sNIcgIELSSGTRgUb.1500 for user conductor
2021-10-10 00:06:25.328750 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.302819019s) to execute
2021-10-10 00:06:26.927247 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:28.023202 I | auth: deleting token wcIXCCttVnWCClzA.1503 for user conductor
2021-10-10 00:06:28.023270 I | auth: deleting token UTtKBAPhLYQNqNkJ.1505 for user conductor
2021-10-10 00:06:29.330138 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.375758152s) to execute
2021-10-10 00:06:31.927638 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:33.329543 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.975654452s) to execute
2021-10-10 00:06:34.023118 I | auth: deleting token pEMHzCNYHUabtOsy.1509 for user conductor
2021-10-10 00:06:34.023173 I | auth: deleting token DcCqjTWylBJSEJPB.1508 for user conductor
2021-10-10 00:06:34.023192 I | auth: deleting token FwlhJuVtmDsCbEkL.1504 for user conductor
2021-10-10 00:06:34.023199 I | auth: deleting token ldpENVimhpsxCVmC.1506 for user conductor
2021-10-10 00:06:34.023208 I | auth: deleting token RPGyUHZlGJOJUlhD.1507 for user conductor
2021-10-10 00:06:36.927937 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:37.625241 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.570283348s) to execute
2021-10-10 00:06:40.023165 I | auth: deleting token FGWNBDiICskzcKvC.1512 for user conductor
2021-10-10 00:06:41.925130 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.198905004s) to execute
2021-10-10 00:06:41.925578 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (4.202214763s) to execute
2021-10-10 00:06:42.023068 I | auth: deleting token CiTEYtEQRFMAODcR.1514 for user conductor
2021-10-10 00:06:42.023123 I | auth: deleting token LzGMDHVRMKJoRnBz.1510 for user conductor
2021-10-10 00:06:42.023135 I | auth: deleting token vBABbcOhbPCRJLBi.1511 for user conductor
2021-10-10 00:06:42.023146 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:43.725587 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.797207795s) to execute
2021-10-10 00:06:43.725915 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.69809918s) to execute
2021-10-10 00:06:43.957790 I | auth: deleting token AFBaCekHFXJdlXNR.1513 for user conductor
2021-10-10 00:06:45.830015 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.061632831s) to execute
2021-10-10 00:06:45.957741 I | auth: deleting token JGmwagSMgcXOpCbU.1515 for user conductor
2021-10-10 00:06:47.023482 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:48.023084 I | auth: deleting token ciKLUkUsGQLHnIQK.1518 for user conductor
2021-10-10 00:06:48.023148 I | auth: deleting token aPkXLYtNznfZitcu.1516 for user conductor
2021-10-10 00:06:48.929145 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.371153395s) to execute
2021-10-10 00:06:50.023102 I | auth: deleting token EYhCPFgrYiKEwxKy.1519 for user conductor
2021-10-10 00:06:50.023176 I | auth: deleting token gVXMJfhApVWuzmGH.1517 for user conductor
2021-10-10 00:06:50.023193 I | auth: deleting token oiRTAQPxyyUKapJp.1520 for user conductor
2021-10-10 00:06:51.327453 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.204192248s) to execute
2021-10-10 00:06:52.023808 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:53.957799 I | auth: deleting token LaNKOgSzEfrZDQrJ.1521 for user conductor
2021-10-10 00:06:53.957859 I | auth: deleting token DcpdwzUCOeOvXyrX.1523 for user conductor
2021-10-10 00:06:56.957786 I | auth: deleting token jGTucpZFEZXkShBE.1522 for user conductor
2021-10-10 00:06:57.023086 I | auth: deleting token wiriexlSJUWWIpWs.1526 for user conductor
2021-10-10 00:06:57.024081 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:06:57.527669 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.101214326s) to execute
2021-10-10 00:06:57.528218 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (6.104765394s) to execute
2021-10-10 00:06:59.423605 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.800273669s) to execute
2021-10-10 00:06:59.423684 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.795947179s) to execute
2021-10-10 00:06:59.957782 I | auth: deleting token ZhbYcmRxRtdSopLV.1524 for user conductor
2021-10-10 00:06:59.957864 I | auth: deleting token XnNkaoROUPqImALq.1527 for user conductor
2021-10-10 00:06:59.957879 I | auth: deleting token nArXAaGTtPXLVqqd.1528 for user conductor
2021-10-10 00:06:59.957892 I | auth: deleting token hZNUhyYelXkqEGWC.1525 for user conductor
2021-10-10 00:06:59.957903 I | auth: deleting token rqsEKmHrFNMUiKuu.1529 for user conductor
2021-10-10 00:07:01.227310 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.669739868s) to execute
2021-10-10 00:07:01.227406 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (772.915479ms) to execute
2021-10-10 00:07:02.024368 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:02.957740 I | auth: deleting token KmwAkWxmslyRtzcY.1530 for user conductor
2021-10-10 00:07:02.957803 I | auth: deleting token FsoJEnrhnmTrGilM.1531 for user conductor
2021-10-10 00:07:05.023067 I | auth: deleting token TjLmOZXtgXqSVxAx.1533 for user conductor
2021-10-10 00:07:05.023143 I | auth: deleting token hDuigRXIUxwVwrhK.1532 for user conductor
2021-10-10 00:07:05.327432 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.904129805s) to execute
2021-10-10 00:07:07.024579 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:07.627672 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.273165775s) to execute
2021-10-10 00:07:07.854471 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.069955ms) to execute
2021-10-10 00:07:07.957858 I | auth: deleting token vyCfoprqfVvYecWM.1534 for user conductor
2021-10-10 00:07:07.957923 I | auth: deleting token QDLLQIsFjlcqfiUp.1535 for user conductor
2021-10-10 00:07:09.957720 I | auth: deleting token yswPNvNKeJJJXHbE.1536 for user conductor
2021-10-10 00:07:09.957773 I | auth: deleting token FrlmMTnLVEWVWDQy.1537 for user conductor
2021-10-10 00:07:12.024841 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:12.154333 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (123.807304ms) to execute
2021-10-10 00:07:14.125420 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.768156424s) to execute
2021-10-10 00:07:14.957687 I | auth: deleting token YuIhUkIEwmCxfZax.1539 for user conductor
2021-10-10 00:07:14.957741 I | auth: deleting token hldIKmZGtuQxzuCL.1540 for user conductor
2021-10-10 00:07:14.957753 I | auth: deleting token WdpBgjUmqfjxtgTr.1538 for user conductor
2021-10-10 00:07:16.129669 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.075373566s) to execute
2021-10-10 00:07:17.025597 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:18.225001 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (304.699087ms) to execute
2021-10-10 00:07:19.023050 I | auth: deleting token sgrWiediVKUFfocW.1541 for user conductor
2021-10-10 00:07:19.023092 I | auth: deleting token yURnlBZbQzavBUYX.1543 for user conductor
2021-10-10 00:07:19.023105 I | auth: deleting token wtkSVhnLfUVlESBh.1542 for user conductor
2021-10-10 00:07:20.023066 I | auth: deleting token QlShhkaQuMEdZtff.1544 for user conductor
2021-10-10 00:07:21.726530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.400755462s) to execute
2021-10-10 00:07:21.957758 I | auth: deleting token HUrardlthQOmwKCh.1545 for user conductor
2021-10-10 00:07:22.025997 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:23.834614 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.105560481s) to execute
2021-10-10 00:07:23.834875 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.009961361s) to execute
2021-10-10 00:07:23.835237 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.106005119s) to execute
2021-10-10 00:07:23.957793 I | auth: deleting token iVRYXPkSuBlYHuXV.1546 for user conductor
2021-10-10 00:07:23.957850 I | auth: deleting token LTgbFVerUjcQPuOy.1547 for user conductor
2021-10-10 00:07:24.023447 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (185.871438ms) to execute
2021-10-10 00:07:24.957720 I | auth: deleting token pehbDaPDJLKyWolK.1548 for user conductor
2021-10-10 00:07:27.026287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:27.932002 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.575062742s) to execute
2021-10-10 00:07:28.154380 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (128.396837ms) to execute
2021-10-10 00:07:29.023110 I | auth: deleting token IrzGhPqyhrlSeQDH.1551 for user conductor
2021-10-10 00:07:29.023178 I | auth: deleting token tfJicDTuSXepOxoP.1549 for user conductor
2021-10-10 00:07:29.023189 I | auth: deleting token zGGdEqfYohhpATtz.1550 for user conductor
2021-10-10 00:07:30.957664 I | auth: deleting token nbfSLJJWGIFweNet.1552 for user conductor
2021-10-10 00:07:30.957728 I | auth: deleting token CkGSiYAPLwIyfFvD.1553 for user conductor
2021-10-10 00:07:32.089064 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:32.228289 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.704800687s) to execute
2021-10-10 00:07:32.957837 I | auth: deleting token voRgDiTXQLMzmpzq.1554 for user conductor
2021-10-10 00:07:35.023163 I | auth: deleting token QJWlVVvuOJbClLfp.1555 for user conductor
2021-10-10 00:07:37.089565 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:39.229488 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.902992769s) to execute
2021-10-10 00:07:39.230464 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (6.807358259s) to execute
2021-10-10 00:07:39.424656 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (101.321094ms) to execute
2021-10-10 00:07:39.424798 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (181.05416ms) to execute
2021-10-10 00:07:39.957768 I | auth: deleting token vAFsJGmTAGYOSuXS.1557 for user conductor
2021-10-10 00:07:42.023100 I | auth: deleting token GADCAgeiORPzNTyq.1558 for user conductor
2021-10-10 00:07:42.023158 I | auth: deleting token prhVbBATNXysuZtu.1556 for user conductor
2021-10-10 00:07:42.023170 I | auth: deleting token GastjhJLUJwwiuvv.1559 for user conductor
2021-10-10 00:07:42.089927 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:44.023202 I | auth: deleting token LxaZWomhGcDBMxFr.1560 for user conductor
2021-10-10 00:07:44.023271 I | auth: deleting token HQMUbdkGJJCGyYPF.1561 for user conductor
2021-10-10 00:07:47.090476 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:47.628246 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (6.103749505s) to execute
2021-10-10 00:07:47.957793 I | auth: deleting token FDbGxqioGdpRUPBd.1562 for user conductor
2021-10-10 00:07:47.957885 I | auth: deleting token OOwUYUtkYjqPSMJJ.1563 for user conductor
2021-10-10 00:07:47.957903 I | auth: deleting token QtsbBEcGkvQfAzdh.1564 for user conductor
2021-10-10 00:07:48.957926 I | auth: deleting token ZJEzMHjvUdakidMv.1565 for user conductor
2021-10-10 00:07:52.090942 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:52.957819 I | auth: deleting token eZMUbryYYbhiNLjm.1567 for user conductor
2021-10-10 00:07:52.957874 I | auth: deleting token bvbtZmRsgLNZYuTP.1566 for user conductor
2021-10-10 00:07:52.957894 I | auth: deleting token ZpTLLMDIlJmENdLW.1568 for user conductor
2021-10-10 00:07:56.957792 I | auth: deleting token pDlhRgiSDWiQASuz.1569 for user conductor
2021-10-10 00:07:56.957836 I | auth: deleting token ehWnYoirDrGikeMb.1570 for user conductor
2021-10-10 00:07:56.957852 I | auth: deleting token qrJtsGwnjwNwSkbq.1571 for user conductor
2021-10-10 00:07:57.091328 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:07:59.957748 I | auth: deleting token buxIPagvOtAUoTaa.1572 for user conductor
2021-10-10 00:08:00.957782 I | auth: deleting token gFWhISFKVYnxiVjg.1574 for user conductor
2021-10-10 00:08:02.091732 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:06.957789 I | auth: deleting token PcfLeRCkZtQUGXvP.1578 for user conductor
2021-10-10 00:08:06.957840 I | auth: deleting token fyRXvDYynhJzzPdP.1577 for user conductor
2021-10-10 00:08:06.957849 I | auth: deleting token HNiWVsjKkGdFROwD.1573 for user conductor
2021-10-10 00:08:06.957862 I | auth: deleting token GhAEknWBszojKKnd.1576 for user conductor
2021-10-10 00:08:06.957871 I | auth: deleting token UnLQHdObopTSLxoC.1575 for user conductor
2021-10-10 00:08:07.092046 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:09.957825 I | auth: deleting token rIjswqDjtICPYstm.1580 for user conductor
2021-10-10 00:08:10.957819 I | auth: deleting token rsoYytFLvMDqpiUO.1579 for user conductor
2021-10-10 00:08:10.957861 I | auth: deleting token RGXbQHPCNUHOTICe.1581 for user conductor
2021-10-10 00:08:12.092376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:13.957843 I | auth: deleting token idIMIxMTaRNPOQrd.1582 for user conductor
2021-10-10 00:08:15.957756 I | auth: deleting token LhYrSWZvpQwkocRT.1584 for user conductor
2021-10-10 00:08:17.092869 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:17.957834 I | auth: deleting token xDMZUIRZQWqFMDTc.1586 for user conductor
2021-10-10 00:08:17.957899 I | auth: deleting token lNcwirvswyKrSMIl.1583 for user conductor
2021-10-10 00:08:17.957912 I | auth: deleting token NnGlCZBceJOrBHGH.1585 for user conductor
2021-10-10 00:08:20.023212 I | auth: deleting token AuRunLUuzAeMpwNt.1587 for user conductor
2021-10-10 00:08:21.957778 I | auth: deleting token DNirQsMcHWbNIAVe.1588 for user conductor
2021-10-10 00:08:21.957843 I | auth: deleting token vaVWdRtMPzAQKGBd.1589 for user conductor
2021-10-10 00:08:21.957862 I | auth: deleting token nINfIuiOxYwLHMYz.1590 for user conductor
2021-10-10 00:08:22.093348 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:24.726094 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.671962726s) to execute
2021-10-10 00:08:24.954927 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (226.491213ms) to execute
2021-10-10 00:08:24.954996 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (226.604517ms) to execute
2021-10-10 00:08:25.055491 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (232.178837ms) to execute
2021-10-10 00:08:26.023140 I | auth: deleting token lHCxSkjJnibNliRa.1591 for user conductor
2021-10-10 00:08:27.093641 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:29.957727 I | auth: deleting token rXVSokAykdxObcnP.1595 for user conductor
2021-10-10 00:08:29.957785 I | auth: deleting token SuQRXGAZEBpqvuCu.1594 for user conductor
2021-10-10 00:08:29.957800 I | auth: deleting token chBejlkeRrEsVEUg.1596 for user conductor
2021-10-10 00:08:29.957811 I | auth: deleting token LKDmIbEEmsfZzuFC.1592 for user conductor
2021-10-10 00:08:29.957822 I | auth: deleting token zSvmbquMjpiwdcGn.1593 for user conductor
2021-10-10 00:08:32.123095 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:37.123437 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:37.523637 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.769016209s) to execute
2021-10-10 00:08:37.957659 I | auth: deleting token KDyvTJOtAHdDsqMz.1597 for user conductor
2021-10-10 00:08:39.426688 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.70101189s) to execute
2021-10-10 00:08:39.957793 I | auth: deleting token zuGLFzDidegSakQy.1600 for user conductor
2021-10-10 00:08:39.957888 I | auth: deleting token EayVnMzufVzkRlnb.1601 for user conductor
2021-10-10 00:08:39.957912 I | auth: deleting token gCScPTZhtIbALwjl.1598 for user conductor
2021-10-10 00:08:39.957927 I | auth: deleting token YOeFCKTDGUwBVEyF.1599 for user conductor
2021-10-10 00:08:39.957941 I | auth: deleting token VcNygdGwzLhMgBfc.1602 for user conductor
2021-10-10 00:08:42.123664 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:43.323650 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.797759324s) to execute
2021-10-10 00:08:43.323870 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.800496335s) to execute
2021-10-10 00:08:44.023320 I | auth: deleting token AYIDncMMcfjgdhkm.1604 for user conductor
2021-10-10 00:08:44.023383 I | auth: deleting token EYtpWOTFjBaMpMmu.1603 for user conductor
2021-10-10 00:08:45.957676 I | auth: deleting token rhlDCpNzrBMRIyuE.1605 for user conductor
2021-10-10 00:08:45.957726 I | auth: deleting token rtXpHhyEJpfgNUck.1606 for user conductor
2021-10-10 00:08:45.957732 I | auth: deleting token ULDbaikbUYDjTIvS.1607 for user conductor
2021-10-10 00:08:47.124287 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:47.329078 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705723638s) to execute
2021-10-10 00:08:49.331733 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (565.329399ms) to execute
2021-10-10 00:08:52.124717 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:08:52.631794 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (777.495946ms) to execute
2021-10-10 00:08:52.957703 I | auth: deleting token XxGVMGbIFZdWNCKQ.1609 for user conductor
2021-10-10 00:08:54.926318 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (202.959831ms) to execute
2021-10-10 00:08:55.023107 I | auth: deleting token fSInzhRSBwfObAuC.1608 for user conductor
2021-10-10 00:08:55.957706 I | auth: deleting token AmaLaPWoprgeFkgb.1612 for user conductor
2021-10-10 00:08:55.957786 I | auth: deleting token HENxROYDwpMgpYUj.1613 for user conductor
2021-10-10 00:08:55.957818 I | auth: deleting token bCKMRypsYbxRJfPj.1610 for user conductor
2021-10-10 00:08:55.957829 I | auth: deleting token orSwVDGpvhYevJgs.1611 for user conductor
2021-10-10 00:08:56.926904 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.972918685s) to execute
2021-10-10 00:08:57.124893 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:00.528817 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.572217179s) to execute
2021-10-10 00:09:00.529517 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.599972002s) to execute
2021-10-10 00:09:01.023103 I | auth: deleting token GgxPqIlamFPSpOzX.1614 for user conductor
2021-10-10 00:09:01.023170 I | auth: deleting token TgTUmaJvbXdMFMuz.1618 for user conductor
2021-10-10 00:09:01.023185 I | auth: deleting token uGmmSFTDYjKMeBCm.1616 for user conductor
2021-10-10 00:09:01.023197 I | auth: deleting token xYQQmvIpsrUhVTAI.1615 for user conductor
2021-10-10 00:09:01.023206 I | auth: deleting token mAEnvCIUbuNBbndN.1617 for user conductor
2021-10-10 00:09:02.223128 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:03.957774 I | auth: deleting token SHWEKsaKgCBvwpXh.1619 for user conductor
2021-10-10 00:09:03.957838 I | auth: deleting token pwpFNqVKauhTVbFD.1620 for user conductor
2021-10-10 00:09:04.423454 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.469070004s) to execute
2021-10-10 00:09:05.957835 I | auth: deleting token agnaILqzMmOBdbgJ.1622 for user conductor
2021-10-10 00:09:05.957907 I | auth: deleting token VhTSOuwylIIjHKYS.1621 for user conductor
2021-10-10 00:09:07.223400 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:08.224160 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.868076026s) to execute
2021-10-10 00:09:08.354622 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (127.709834ms) to execute
2021-10-10 00:09:12.023098 I | auth: deleting token QPNVzBmpteUJijcb.1624 for user conductor
2021-10-10 00:09:12.023146 I | auth: deleting token TdLzKsvsXuXrKHzE.1626 for user conductor
2021-10-10 00:09:12.023160 I | auth: deleting token vUumBCXGbCJWMOgk.1625 for user conductor
2021-10-10 00:09:12.023169 I | auth: deleting token RLEIWdzhPYcHFIfL.1623 for user conductor
2021-10-10 00:09:12.023179 I | auth: deleting token QWDPsbGmIuFJYEhI.1627 for user conductor
2021-10-10 00:09:12.223752 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:12.530329 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.807096282s) to execute
2021-10-10 00:09:16.726429 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.969886903s) to execute
2021-10-10 00:09:16.854672 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.539194ms) to execute
2021-10-10 00:09:17.224123 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:18.931220 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (907.677683ms) to execute
2021-10-10 00:09:19.957794 I | auth: deleting token bscdozhoSFmrNzoy.1629 for user conductor
2021-10-10 00:09:21.023388 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.998654008s) to execute
2021-10-10 00:09:22.023191 I | auth: deleting token kmrNoEImBLrSDcmB.1630 for user conductor
2021-10-10 00:09:22.224430 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:23.023414 I | auth: deleting token LyfCgSqyapeEjATQ.1632 for user conductor
2021-10-10 00:09:23.023480 I | auth: deleting token PiBEiZPWDPLsJlpq.1631 for user conductor
2021-10-10 00:09:23.023493 I | auth: deleting token ppcofuSBFtPrSByq.1628 for user conductor
2021-10-10 00:09:23.023511 I | auth: deleting token dfqoHKvlTVOWoVjG.1633 for user conductor
2021-10-10 00:09:23.326570 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.172079359s) to execute
2021-10-10 00:09:23.326783 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.300359473s) to execute
2021-10-10 00:09:25.225451 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.771149371s) to execute
2021-10-10 00:09:25.226504 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.801452594s) to execute
2021-10-10 00:09:25.354520 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (125.72718ms) to execute
2021-10-10 00:09:25.957816 I | auth: deleting token RhlVLoILYqpIYNPl.1634 for user conductor
2021-10-10 00:09:27.023069 I | auth: deleting token kULWDVuVwEfPhRTb.1635 for user conductor
2021-10-10 00:09:27.224658 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:27.229103 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (974.637541ms) to execute
2021-10-10 00:09:29.023839 I | auth: deleting token zrJZMCmnURLnIwQv.1637 for user conductor
2021-10-10 00:09:29.023914 I | auth: deleting token zfgpdZsuKceuagGk.1636 for user conductor
2021-10-10 00:09:29.625529 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (601.559319ms) to execute
2021-10-10 00:09:30.957801 I | auth: deleting token AtsKSYYieXFdhxWd.1638 for user conductor
2021-10-10 00:09:30.957875 I | auth: deleting token PUZcIwEohlsOGyAS.1639 for user conductor
2021-10-10 00:09:32.224914 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:32.957713 I | auth: deleting token hXfTykXAUgKioxNa.1640 for user conductor
2021-10-10 00:09:33.957819 I | auth: deleting token agYTTMqPeGnTCFiT.1641 for user conductor
2021-10-10 00:09:35.825420 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.068968827s) to execute
2021-10-10 00:09:36.957762 I | auth: deleting token ZQTNEADwLkbchaiM.1644 for user conductor
2021-10-10 00:09:36.957827 I | auth: deleting token EUpdWxrRtYQeWyLM.1642 for user conductor
2021-10-10 00:09:37.225190 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:40.227324 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.172818573s) to execute
2021-10-10 00:09:41.023037 I | auth: deleting token RncfPKpUivSUOUyw.1645 for user conductor
2021-10-10 00:09:41.023080 I | auth: deleting token NXbcnNQLFhaJjPXT.1646 for user conductor
2021-10-10 00:09:41.023097 I | auth: deleting token NVRTtYatysgpVpAt.1647 for user conductor
2021-10-10 00:09:41.023119 I | auth: deleting token TDGVOCQIxUpoajSd.1648 for user conductor
2021-10-10 00:09:42.224600 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.898424334s) to execute
2021-10-10 00:09:42.224979 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.901607506s) to execute
2021-10-10 00:09:42.225406 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:44.225572 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.902338684s) to execute
2021-10-10 00:09:44.225796 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.998238421s) to execute
2021-10-10 00:09:45.957812 I | auth: deleting token MgeXhQJRHDHKRjyI.1649 for user conductor
2021-10-10 00:09:45.957870 I | auth: deleting token hSRZvvVfESExyrGh.1650 for user conductor
2021-10-10 00:09:45.957885 I | auth: deleting token UYFBEXVHPgAFIFsB.1651 for user conductor
2021-10-10 00:09:46.326016 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (2.09819006s) to execute
2021-10-10 00:09:46.326179 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.999491257s) to execute
2021-10-10 00:09:46.326265 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.200254489s) to execute
2021-10-10 00:09:46.957798 I | auth: deleting token EEsaLIfQyQrJgEMh.1652 for user conductor
2021-10-10 00:09:47.225667 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:48.128343 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.701810848s) to execute
2021-10-10 00:09:50.023119 I | auth: deleting token cGCwiDQDKZNEutOM.1653 for user conductor
2021-10-10 00:09:50.127167 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.995355062s) to execute
2021-10-10 00:09:50.223163 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.872817726s) to execute
2021-10-10 00:09:51.957804 I | auth: deleting token ivzZeWdKXbhQyPfi.1654 for user conductor
2021-10-10 00:09:52.031244 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.805356659s) to execute
2021-10-10 00:09:52.031552 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (1.805478285s) to execute
2021-10-10 00:09:52.031797 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (277.207451ms) to execute
2021-10-10 00:09:52.225905 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:53.927345 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.773074039s) to execute
2021-10-10 00:09:54.957803 I | auth: deleting token jlBluubraWajJzdt.1655 for user conductor
2021-10-10 00:09:56.129293 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.274984316s) to execute
2021-10-10 00:09:57.226147 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:09:58.023160 I | auth: deleting token zCwxcNmgkmOYmJVn.1656 for user conductor
2021-10-10 00:09:58.327424 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.172867433s) to execute
2021-10-10 00:10:02.226362 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:02.957799 I | auth: deleting token BEjPIcdtBvkEAQKa.1658 for user conductor
2021-10-10 00:10:02.957863 I | auth: deleting token TFErCFFaNJaxbXtU.1657 for user conductor
2021-10-10 00:10:02.957884 I | auth: deleting token VwfmmbiELpsJxUPj.1659 for user conductor
2021-10-10 00:10:05.623452 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (668.825092ms) to execute
2021-10-10 00:10:06.023133 I | auth: deleting token bDBlmROlrJUcRJPv.1660 for user conductor
2021-10-10 00:10:06.023179 I | auth: deleting token XfqczerRDoJkCjQp.1662 for user conductor
2021-10-10 00:10:07.023121 I | auth: deleting token xFNSIORYDNflmvhc.1663 for user conductor
2021-10-10 00:10:07.023165 I | auth: deleting token cdUKXueBTPIGKwGW.1661 for user conductor
2021-10-10 00:10:07.323338 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:09.023238 I | auth: deleting token SomHwkKadWImjFCQ.1665 for user conductor
2021-10-10 00:10:09.023314 I | auth: deleting token psNTXhTvfZzGtJso.1664 for user conductor
2021-10-10 00:10:09.731228 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.807724601s) to execute
2021-10-10 00:10:11.023090 I | auth: deleting token PvewFRoSTrkzhWXQ.1666 for user conductor
2021-10-10 00:10:11.731029 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.876730783s) to execute
2021-10-10 00:10:11.731376 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.997600555s) to execute
2021-10-10 00:10:11.855881 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (122.010261ms) to execute
2021-10-10 00:10:11.957670 I | auth: deleting token qWvLcRjUzQeICzzG.1667 for user conductor
2021-10-10 00:10:12.323753 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:13.023181 I | auth: deleting token uVciCnFQclbvHFWt.1668 for user conductor
2021-10-10 00:10:14.325976 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.269308809s) to execute
2021-10-10 00:10:14.957744 I | auth: deleting token pBuNDXjBvqxBaTXz.1669 for user conductor
2021-10-10 00:10:16.957772 I | auth: deleting token YJfzQBIvFBuwRBwQ.1670 for user conductor
2021-10-10 00:10:17.324162 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:18.957857 I | auth: deleting token JJBDawJffrWyxEEp.1671 for user conductor
2021-10-10 00:10:20.624729 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (370.332207ms) to execute
2021-10-10 00:10:20.968773 I | auth: deleting token jZCbbRIXrncBvJHn.1672 for user conductor
2021-10-10 00:10:22.227817 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.470529162s) to execute
2021-10-10 00:10:22.324449 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:22.355911 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (125.45952ms) to execute
2021-10-10 00:10:24.958003 I | auth: deleting token FPuzcYVdUyDgQbhI.1676 for user conductor
2021-10-10 00:10:24.958118 I | auth: deleting token LMPuZpWtVARazYbf.1674 for user conductor
2021-10-10 00:10:26.828530 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.502486218s) to execute
2021-10-10 00:10:27.023019 I | auth: deleting token izAqXpPnrWhZZKnz.1675 for user conductor
2021-10-10 00:10:27.023089 I | auth: deleting token pmsKppgHjitpBmxa.1673 for user conductor
2021-10-10 00:10:27.324627 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:28.957792 I | auth: deleting token GqhaeqwXeWOYgfdf.1677 for user conductor
2021-10-10 00:10:30.830035 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.906734966s) to execute
2021-10-10 00:10:30.830308 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (3.906711628s) to execute
2021-10-10 00:10:31.023347 I | auth: deleting token rTvUuZfrMdoFysDY.1679 for user conductor
2021-10-10 00:10:31.023386 I | auth: deleting token HJWqIHzhZUxglYcI.1680 for user conductor
2021-10-10 00:10:31.023397 I | auth: deleting token BgzOkjheLUMNGJRa.1678 for user conductor
2021-10-10 00:10:32.324844 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:33.025404 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.101974217s) to execute
2021-10-10 00:10:33.025549 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.102204005s) to execute
2021-10-10 00:10:33.025629 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.002154073s) to execute
2021-10-10 00:10:35.030542 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.907215323s) to execute
2021-10-10 00:10:37.023260 I | auth: deleting token gaPerlJDVdHkYyZB.1682 for user conductor
2021-10-10 00:10:37.023320 I | auth: deleting token TEorntmYWhSLBZyV.1684 for user conductor
2021-10-10 00:10:37.023331 I | auth: deleting token ptRxhaeHetFdWJBO.1685 for user conductor
2021-10-10 00:10:37.023343 I | auth: deleting token GKmcOJVlgLnzyDqF.1681 for user conductor
2021-10-10 00:10:37.023350 I | auth: deleting token ZkEfeWtYdJWqgFlR.1683 for user conductor
2021-10-10 00:10:37.029331 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.874581713s) to execute
2021-10-10 00:10:37.029596 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (1.906267052s) to execute
2021-10-10 00:10:37.254375 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (130.960244ms) to execute
2021-10-10 00:10:37.325164 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:37.354499 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (197.868816ms) to execute
2021-10-10 00:10:40.957763 I | auth: deleting token ebbkqctPqvZtMkYJ.1687 for user conductor
2021-10-10 00:10:40.957824 I | auth: deleting token eIyxdnzmPhPhhTHY.1688 for user conductor
2021-10-10 00:10:40.957839 I | auth: deleting token vsMKPSPxbPlbQwGm.1686 for user conductor
2021-10-10 00:10:42.325381 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:42.957752 I | auth: deleting token sGIwVpOTahroTROb.1689 for user conductor
2021-10-10 00:10:43.227718 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.573413989s) to execute
2021-10-10 00:10:44.957824 I | auth: deleting token LsbrBiFSEhYYYMpc.1691 for user conductor
2021-10-10 00:10:45.325342 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.064515489s) to execute
2021-10-10 00:10:45.957779 I | auth: deleting token ZTKxMXRwFDeTcZtI.1690 for user conductor
2021-10-10 00:10:47.325748 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:47.725687 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (399.504852ms) to execute
2021-10-10 00:10:47.954550 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (131.099745ms) to execute
2021-10-10 00:10:47.957707 I | auth: deleting token oJUZJEUhPGcOTNoo.1692 for user conductor
2021-10-10 00:10:47.957760 I | auth: deleting token aaLLRunlDGVwsrJW.1693 for user conductor
2021-10-10 00:10:51.957723 I | auth: deleting token caBLkLOEXUiWOQJK.1696 for user conductor
2021-10-10 00:10:51.957788 I | auth: deleting token cAjKmILnIjxJXlZK.1694 for user conductor
2021-10-10 00:10:52.326007 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:54.023047 I | auth: deleting token xMMIFQTAQeNpMVuv.1695 for user conductor
2021-10-10 00:10:55.957777 I | auth: deleting token JVSscXyidCpQTSGc.1699 for user conductor
2021-10-10 00:10:55.957872 I | auth: deleting token loWBEWDiytxSWaFw.1697 for user conductor
2021-10-10 00:10:55.957889 I | auth: deleting token mwWGDIUmcCfVkVJa.1698 for user conductor
2021-10-10 00:10:55.957900 I | auth: deleting token pFWUoMjKGnnSWOvT.1700 for user conductor
2021-10-10 00:10:56.724606 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.99616606s) to execute
2021-10-10 00:10:57.326301 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:10:58.957907 I | auth: deleting token iPrFSosFYapnVZin.1702 for user conductor
2021-10-10 00:10:58.957974 I | auth: deleting token FhRylyXzduQcUhZD.1701 for user conductor
2021-10-10 00:11:00.424839 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.370862864s) to execute
2021-10-10 00:11:01.023372 I | auth: deleting token EAxeBsjXPsWrjUVT.1703 for user conductor
2021-10-10 00:11:02.326579 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:02.654850 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (131.468736ms) to execute
2021-10-10 00:11:03.023075 I | auth: deleting token TZJQzBpZnjZQNwJh.1706 for user conductor
2021-10-10 00:11:03.023159 I | auth: deleting token rrIGzKQcqzMUFZdP.1704 for user conductor
2021-10-10 00:11:03.023173 I | auth: deleting token ezldIDqfyJyPieZm.1705 for user conductor
2021-10-10 00:11:04.726167 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.565961444s) to execute
2021-10-10 00:11:06.830794 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.976671604s) to execute
2021-10-10 00:11:07.023091 I | auth: deleting token pFQqLTbrrtbatfbN.1708 for user conductor
2021-10-10 00:11:07.326822 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:08.626395 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.671718618s) to execute
2021-10-10 00:11:08.626543 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.703227377s) to execute
2021-10-10 00:11:09.957660 I | auth: deleting token OSueguNJfGpLreZR.1707 for user conductor
2021-10-10 00:11:09.957726 I | auth: deleting token SYISwagbsiVAylid.1710 for user conductor
2021-10-10 00:11:10.624278 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.8958477s) to execute
2021-10-10 00:11:12.423227 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:12.624953 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.900547795s) to execute
2021-10-10 00:11:12.756698 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.522433ms) to execute
2021-10-10 00:11:13.957774 I | auth: deleting token puZhCclelZvxpORV.1709 for user conductor
2021-10-10 00:11:14.726185 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.967115913s) to execute
2021-10-10 00:11:14.726383 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (572.346468ms) to execute
2021-10-10 00:11:15.957794 I | auth: deleting token IQszdzMnkfGcitJJ.1712 for user conductor
2021-10-10 00:11:15.957852 I | auth: deleting token sGlxNmdqjuTkqihA.1711 for user conductor
2021-10-10 00:11:16.924248 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (400.892389ms) to execute
2021-10-10 00:11:17.423799 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:17.957807 I | auth: deleting token GPbddJobVNrrorCp.1715 for user conductor
2021-10-10 00:11:17.957878 I | auth: deleting token KmRATGSmlVyICtEf.1713 for user conductor
2021-10-10 00:11:17.957908 I | auth: deleting token kdLCnQOUnZWtduqj.1714 for user conductor
2021-10-10 00:11:19.731574 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (974.863795ms) to execute
2021-10-10 00:11:19.957699 I | auth: deleting token KirTQizmtppnUHzj.1717 for user conductor
2021-10-10 00:11:19.957770 I | auth: deleting token ZbmSsiFkGWmwMUUb.1716 for user conductor
2021-10-10 00:11:21.830023 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (306.090019ms) to execute
2021-10-10 00:11:22.154722 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (197.514226ms) to execute
2021-10-10 00:11:22.424209 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:23.957871 I | auth: deleting token vPeLWtZgWjoreMgu.1720 for user conductor
2021-10-10 00:11:23.957961 I | auth: deleting token vXdgdSmTDvkJSWQh.1719 for user conductor
2021-10-10 00:11:23.957980 I | auth: deleting token OeEPCvrTjLgZyKad.1718 for user conductor
2021-10-10 00:11:25.957741 I | auth: deleting token phtmVUgnoyKQigmq.1721 for user conductor
2021-10-10 00:11:25.957797 I | auth: deleting token yvZvTRosZsiAqXQe.1722 for user conductor
2021-10-10 00:11:27.424634 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:27.724553 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.792608494s) to execute
2021-10-10 00:11:29.428287 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.700405785s) to execute
2021-10-10 00:11:29.428473 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.700994091s) to execute
2021-10-10 00:11:29.555923 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (124.614261ms) to execute
2021-10-10 00:11:29.957834 I | auth: deleting token BkCHadVDgWiinnic.1726 for user conductor
2021-10-10 00:11:29.957913 I | auth: deleting token pBkqplqFNNlGkobz.1723 for user conductor
2021-10-10 00:11:29.957922 I | auth: deleting token yvaqzmNzNUVlXLON.1724 for user conductor
2021-10-10 00:11:29.957967 I | auth: deleting token gUKmzWWhLSHvCRUI.1725 for user conductor
2021-10-10 00:11:32.424856 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:32.624397 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (470.333305ms) to execute
2021-10-10 00:11:33.957743 I | auth: deleting token DgvkuvQqWmIINQxD.1727 for user conductor
2021-10-10 00:11:33.957840 I | auth: deleting token guoHdlLBBHymvVyK.1728 for user conductor
2021-10-10 00:11:33.957862 I | auth: deleting token lXlxTuGemSdeIRAr.1729 for user conductor
2021-10-10 00:11:37.425135 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:37.957808 I | auth: deleting token zeoflOAYIqpfGVzr.1730 for user conductor
2021-10-10 00:11:40.528136 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (673.769393ms) to execute
2021-10-10 00:11:41.957816 I | auth: deleting token PmeimsmnAZpvEdXs.1731 for user conductor
2021-10-10 00:11:41.957931 I | auth: deleting token TeYseyQiFuORBOKl.1735 for user conductor
2021-10-10 00:11:41.957952 I | auth: deleting token TqGGSBMBndbtxDia.1733 for user conductor
2021-10-10 00:11:42.425424 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:42.631991 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (508.553806ms) to execute
2021-10-10 00:11:42.957710 I | auth: deleting token ZnaOVceZTPLfNdra.1734 for user conductor
2021-10-10 00:11:42.957778 I | auth: deleting token mdMUlKgAMTeBghik.1736 for user conductor
2021-10-10 00:11:42.957794 I | auth: deleting token AuCNaYgVybaehIFP.1732 for user conductor
2021-10-10 00:11:44.631399 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.708151191s) to execute
2021-10-10 00:11:44.823322 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (188.858533ms) to execute
2021-10-10 00:11:44.954490 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (226.251513ms) to execute
2021-10-10 00:11:45.963314 I | auth: deleting token sdYWExRIBNOCSpay.1737 for user conductor
2021-10-10 00:11:45.963386 I | auth: deleting token pGNveDjTPWqqCshc.1739 for user conductor
2021-10-10 00:11:45.963399 I | auth: deleting token vvWrxmMxjildujRL.1738 for user conductor
2021-10-10 00:11:47.425675 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:49.023053 I | auth: deleting token uDFKomPlFnYKLebc.1740 for user conductor
2021-10-10 00:11:49.631036 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.776693498s) to execute
2021-10-10 00:11:51.925924 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.100626818s) to execute
2021-10-10 00:11:51.926081 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.167798748s) to execute
2021-10-10 00:11:52.023092 I | auth: deleting token YkwyVbXYcaurZQDF.1742 for user conductor
2021-10-10 00:11:52.426029 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:57.426878 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp 10.233.77.177:2380: getsockopt: connection refused
2021-10-10 00:11:57.926239 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (5.995664779s) to execute
2021-10-10 00:11:58.023140 I | auth: deleting token HuyObCFQNRPcPaJS.1746 for user conductor
2021-10-10 00:11:58.023188 I | auth: deleting token SsyEVFSXTmJPiDaz.1741 for user conductor
2021-10-10 00:11:58.023201 I | auth: deleting token ikAVWIOrSrelTjaS.1743 for user conductor
2021-10-10 00:11:58.023209 I | auth: deleting token hvcZcqqPzbgeMDei.1745 for user conductor
2021-10-10 00:11:58.023218 I | auth: deleting token JIZnYcVnaoAivcnC.1744 for user conductor
2021-10-10 00:11:59.826224 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.899693028s) to execute
2021-10-10 00:11:59.826964 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.897745535s) to execute
2021-10-10 00:11:59.923511 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.994104643s) to execute
2021-10-10 00:11:59.955517 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (126.617937ms) to execute
2021-10-10 00:11:59.957696 I | auth: deleting token EsmdvYiuCFKvCGur.1747 for user conductor
2021-10-10 00:12:01.957739 I | auth: deleting token TolzGsqHHtJPRuUT.1749 for user conductor
2021-10-10 00:12:01.957797 I | auth: deleting token KeIKmNmwFTTdulme.1748 for user conductor
2021-10-10 00:12:02.523061 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:05.957837 I | auth: deleting token IGFWRoajqZvvZkGh.1752 for user conductor
2021-10-10 00:12:05.957887 I | auth: deleting token DqyUapIXyUBGGyvx.1751 for user conductor
2021-10-10 00:12:05.957898 I | auth: deleting token mQUCczuMFdTLTkIy.1750 for user conductor
2021-10-10 00:12:06.231860 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.177257129s) to execute
2021-10-10 00:12:07.523388 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:07.957722 I | auth: deleting token VuqytKjwVxXBTsQV.1754 for user conductor
2021-10-10 00:12:07.957916 I | auth: deleting token RMCEwtyzthMcqeta.1753 for user conductor
2021-10-10 00:12:08.328872 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.905630964s) to execute
2021-10-10 00:12:08.329174 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (2.005807135s) to execute
2021-10-10 00:12:08.329526 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.006160663s) to execute
2021-10-10 00:12:08.554450 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (130.821103ms) to execute
2021-10-10 00:12:09.957758 I | auth: deleting token QOlgkLparQxFhXvY.1755 for user conductor
2021-10-10 00:12:10.824423 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.301230583s) to execute
2021-10-10 00:12:12.523651 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:12.957804 I | auth: deleting token cZbEYVNBHOfLhggn.1756 for user conductor
2021-10-10 00:12:13.025005 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.098873164s) to execute
2021-10-10 00:12:15.023151 I | auth: deleting token fTVYmYbLrSFdVVst.1758 for user conductor
2021-10-10 00:12:15.023214 I | auth: deleting token GurobSFswZNlgyBG.1757 for user conductor
2021-10-10 00:12:16.626117 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (202.674108ms) to execute
2021-10-10 00:12:17.023093 I | auth: deleting token PxkRAVDvgKdZnvRN.1760 for user conductor
2021-10-10 00:12:17.023161 I | auth: deleting token XvMlUzbCGfqKBcdF.1759 for user conductor
2021-10-10 00:12:17.523924 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:18.627319 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.773119124s) to execute
2021-10-10 00:12:18.754443 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (124.489571ms) to execute
2021-10-10 00:12:18.957782 I | auth: deleting token NeOLDCeEFrrkIsfX.1761 for user conductor
2021-10-10 00:12:22.023049 I | auth: deleting token ilqWIZQMYTxySKQT.1762 for user conductor
2021-10-10 00:12:22.524376 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:22.824609 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.56995234s) to execute
2021-10-10 00:12:24.023083 I | auth: deleting token vmouHEEFWNlvTkge.1763 for user conductor
2021-10-10 00:12:24.023144 I | auth: deleting token HFJjcgJiMWjObpWC.1765 for user conductor
2021-10-10 00:12:24.530500 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.705674709s) to execute
2021-10-10 00:12:24.957807 I | auth: deleting token jtdAiOlMWrSBazFr.1766 for user conductor
2021-10-10 00:12:24.957873 I | auth: deleting token CMIxGipXXceyPDJm.1764 for user conductor
2021-10-10 00:12:26.431521 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.777069499s) to execute
2021-10-10 00:12:26.431733 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.898465305s) to execute
2021-10-10 00:12:26.432083 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (1.898432246s) to execute
2021-10-10 00:12:26.654396 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (130.651251ms) to execute
2021-10-10 00:12:26.755636 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (129.516869ms) to execute
2021-10-10 00:12:27.524479 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:28.023108 I | auth: deleting token GXqywzyQVpgvSOqv.1767 for user conductor
2021-10-10 00:12:29.023298 I | auth: deleting token fnAcZOFXjyQoIKHO.1769 for user conductor
2021-10-10 00:12:29.023370 I | auth: deleting token ndWtFSdPXXgrkUZv.1768 for user conductor
2021-10-10 00:12:32.131500 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (3.508240591s) to execute
2021-10-10 00:12:32.354487 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (125.686595ms) to execute
2021-10-10 00:12:32.423366 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (100.205279ms) to execute
2021-10-10 00:12:32.524657 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:32.957782 I | auth: deleting token oWRKGZRUQlWQXVqM.1772 for user conductor
2021-10-10 00:12:32.957871 I | auth: deleting token pSJHeYarSmtJHhuN.1770 for user conductor
2021-10-10 00:12:36.626329 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.871804662s) to execute
2021-10-10 00:12:36.754887 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (125.746533ms) to execute
2021-10-10 00:12:37.524958 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:40.023156 I | auth: deleting token AYLIOlpNRqRDbRaK.1776 for user conductor
2021-10-10 00:12:40.023219 I | auth: deleting token LSfYMTjhdNFtiAAy.1775 for user conductor
2021-10-10 00:12:40.023258 I | auth: deleting token rbRcOHQQPmhosxzI.1773 for user conductor
2021-10-10 00:12:40.023269 I | auth: deleting token TbimgDFEFbXfQSDP.1774 for user conductor
2021-10-10 00:12:40.023284 I | auth: deleting token QNLLdSofGWQLbkdM.1771 for user conductor
2021-10-10 00:12:40.627809 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.673526699s) to execute
2021-10-10 00:12:42.525257 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:42.924139 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (2.099051831s) to execute
2021-10-10 00:12:42.924325 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.201181305s) to execute
2021-10-10 00:12:43.054432 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (128.061704ms) to execute
2021-10-10 00:12:47.525492 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:47.629836 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (4.106520829s) to execute
2021-10-10 00:12:48.023262 I | auth: deleting token FnWMxvqOegPKscdl.1780 for user conductor
2021-10-10 00:12:48.023331 I | auth: deleting token xDNgvkcONEfwoRCX.1779 for user conductor
2021-10-10 00:12:48.023353 I | auth: deleting token hnRVPXIEQMHDWjmf.1778 for user conductor
2021-10-10 00:12:48.023363 I | auth: deleting token UscwGJfNLWSLrTeM.1782 for user conductor
2021-10-10 00:12:48.023375 I | auth: deleting token IQwcbgxMBScjvmRn.1777 for user conductor
2021-10-10 00:12:48.023384 I | auth: deleting token kifeTVWxHtdAEcIb.1781 for user conductor
2021-10-10 00:12:50.023074 I | auth: deleting token MOFCUovkFcjoCGwz.1783 for user conductor
2021-10-10 00:12:50.023601 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.368936137s) to execute
2021-10-10 00:12:52.525761 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:52.957828 I | auth: deleting token PEDKErtPjYphsqeH.1784 for user conductor
2021-10-10 00:12:56.023188 I | auth: deleting token AIrsmAWelzFfdUDT.1785 for user conductor
2021-10-10 00:12:57.526066 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:12:58.023075 I | auth: deleting token yFLomyeVOHHWxgfb.1786 for user conductor
2021-10-10 00:12:58.824843 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.770818123s) to execute
2021-10-10 00:13:00.724552 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.895749791s) to execute
2021-10-10 00:13:00.724779 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (1.898041237s) to execute
2021-10-10 00:13:00.854478 W | etcdserver: read-only range request "key:\"conductor_rpc/controller\" " with result "range_response_count:1 size:265" took too long (2.025765611s) to execute
2021-10-10 00:13:00.854632 W | etcdserver: read-only range request "key:\"conductor/plans/\" range_end:\"conductor/plans0\" " with result "range_response_count:1 size:583" took too long (2.025737716s) to execute
2021-10-10 00:13:00.856203 W | etcdserver: read-only range request "key:\"conductor_rpc/data\" " with result "range_response_count:1 size:259" took too long (128.330192ms) to execute
2021-10-10 00:13:01.023082 I | auth: deleting token NaQBWoSmJHClxDjz.1787 for user conductor
2021-10-10 00:13:02.526342 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:13:03.968582 I | auth: deleting token KgXwpdkhbDJTtHYY.1788 for user conductor
2021-10-10 00:13:06.957806 I | auth: deleting token FpbKChnvGMrDNbJv.1790 for user conductor
2021-10-10 00:13:07.526649 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:13:08.957851 I | auth: deleting token YAtMBygdAfypnKPl.1791 for user conductor
2021-10-10 00:13:11.127476 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (8.101513043s) to execute
2021-10-10 00:13:11.957723 I | auth: deleting token gEDJlHDAvYQrpsKk.1792 for user conductor
2021-10-10 00:13:12.623044 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.254.25.10:53: no such host
2021-10-10 00:13:13.031475 W | etcdserver: request "header: authenticate:" with result "size:51" took too long (1.804493296s) to execute
2021-10-10 00:13:13.123095 W | etcdserver: read-only range request "key:\"conductor_rpc/controller/\" range_end:\"conductor_rpc/controller0\" " with result "range_response_count:0 size:4" took too long (1.992716894s) to execute
2021-10-10 00:13:13.323594 W | etcdserver: read-only range request "key:\"conductor_rpc/data/\" range_end:\"conductor_rpc/data0\" " with result "range_response_count:0 size:4" took too long (1.999664245s) to execute
2021-10-10 00:13:13.356664 W | etcdserver: read-only range request "key:\"conductor/plans\" " with result "range_response_count:1 size:481" took too long (233.294769ms) to execute
2021-10-10 00:13:15.022972 I | auth: deleting token SXQoQheSgmIWiMmd.1793 for user conductor
2021-10-10 00:13:16.957741 I | auth: deleting token GkWdtyimSNBBHFDJ.1794 for user conductor
2021-10-10 00:13:17.623375 W | rafthttp: health check for peer 8aae4c350a2413a5 could not connect: dial tcp: lookup onap-oof-has-etcd-0.oof-has-etcd on 169.