Max level shown:
12023-01-20T02:09:29.529ZINFOtest_instance_metrics: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpm1YIU2
22023-01-20T02:09:29.529ZINFOtest_instance_metrics: cockroach: copying from seed directory (/work/oxidecomputer/omicron/target/debug/build/nexus-test-utils-09b33cf026648d0e/out/crdb-base) to storage directory (/var/tmp/omicron_tmp/.tmpm1YIU2/data)
32023-01-20T02:09:29.583ZINFOtest_instance_metrics: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpm1YIU2/data,ballast-size=0 --listen-addr 127.0.0.1:0 --listening-url-file /var/tmp/omicron_tmp/.tmpm1YIU2/listen-url
42023-01-20T02:09:29.583ZINFOtest_instance_metrics: cockroach environment: BUILDOMAT_JOB_ID=01GQ6DSKKCKDRTKHJRXV6HGZ68 BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/nightly-2022-09-27-x86_64-unknown-linux-gnu/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CI=true GITHUB_BRANCH=main GITHUB_REF=refs/heads/main GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=97a40937624ce71a246581f3dda8aa5caa665490 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-e76d8cc33f17be6d/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-649a8d99fe8125fa/out:/work/oxidecomputer/omicron/target/debug/build/ring-d195d389c5500456/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/nightly-2022-09-27-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/nightly-2022-09-27-x86_64-unknown-linux-gnu/lib LOGNAME=build OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-f137f263f8797506/out PATH=/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin:/work/oxidecomputer/omicron/out/cockroachdb/bin:/work/oxidecomputer/omicron/out/clickhouse PWD=/work/oxidecomputer/omicron RUSTDOCFLAGS=-D warnings RUSTFLAGS=-D warnings RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=nightly-2022-09-27-x86_64-unknown-linux-gnu RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/lib/ssl/certs SSL_CERT_FILE=/usr/lib/ssl/certs/ca-certificates.crt TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build
52023-01-20T02:09:31.532ZINFOtest_instance_metrics: cockroach pid: 61287
62023-01-20T02:09:31.532ZINFOtest_instance_metrics: cockroach listen URL: postgresql://root@127.0.0.1:45333/omicron?sslmode=disable
72023-01-20T02:09:32.150ZINFOtest_instance_metrics: setting up nexus server
82023-01-20T02:09:32.151ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Action
92023-01-20T02:09:32.151ZINFOtest_instance_metrics (ServerContext): registering Oso class class = AnyActor
102023-01-20T02:09:32.151ZINFOtest_instance_metrics (ServerContext): registering Oso class class = AuthenticatedActor
112023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Database
122023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Fleet
132023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = IpPoolList
142023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = GlobalImageList
152023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = ConsoleSessionList
162023-01-20T02:09:32.152ZINFOtest_instance_metrics (ServerContext): registering Oso class class = DeviceAuthRequestList
172023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SiloIdentityProviderList
182023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SiloUserList
192023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Organization
202023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Project
212023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Disk
222023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Snapshot
232023-01-20T02:09:32.153ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Instance
242023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = IpPool
252023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = NetworkInterface
262023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Vpc
272023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = VpcRouter
282023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = RouterRoute
292023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = VpcSubnet
302023-01-20T02:09:32.154ZINFOtest_instance_metrics (ServerContext): registering Oso class class = ConsoleSession
312023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = DeviceAuthRequest
322023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = DeviceAccessToken
332023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Rack
342023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = RoleBuiltin
352023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SshKey
362023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Silo
372023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SiloUser
382023-01-20T02:09:32.155ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SiloGroup
392023-01-20T02:09:32.163ZINFOtest_instance_metrics (ServerContext): registering Oso class class = IdentityProvider
402023-01-20T02:09:32.164ZINFOtest_instance_metrics (ServerContext): registering Oso class class = SamlIdentityProvider
412023-01-20T02:09:32.164ZINFOtest_instance_metrics (ServerContext): registering Oso class class = Sled
422023-01-20T02:09:32.164ZINFOtest_instance_metrics (ServerContext): registering Oso class class = UpdateAvailableArtifact
432023-01-20T02:09:32.164ZINFOtest_instance_metrics (ServerContext): registering Oso class class = UserBuiltin
442023-01-20T02:09:32.166ZINFOtest_instance_metrics (ServerContext): registering Oso class class = GlobalImage
452023-01-20T02:09:32.166ZINFOtest_instance_metrics (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/ORGANIZATION/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Organization {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", organization: Organization)\n\tif organization.silo = silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Organization)\n\trelations = { parent_organization: Organization };\n\t"admin" if "collaborator" on "parent_organization";\n\t"viewer" if "viewer" on "parent_organization";\n}\nhas_relation(organization: Organization, "parent_organization", project: Project)\n\tif project.organization = organization;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/ORGANIZATION/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/system/images") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for accessing "/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/system/images" (in the API)\nresource GlobalImageList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the global images list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list global images.\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", global_image_list: GlobalImageList)\n\tif global_image_list.fleet = fleet;\n\n# Any authenticated user can list and read global images\nhas_permission(_actor: AuthenticatedActor, "list_children", _global_image_list: GlobalImageList);\nhas_permission(_actor: AuthenticatedActor, "read", _global_image: GlobalImage);\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource NetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: NetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: NetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource UpdateAvailableArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UpdateAvailableArtifact)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n resource GlobalImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: GlobalImage)\n if child.fleet = fleet;\n
462023-01-20T02:09:32.176ZINFOtest_instance_metrics (ServerContext): Setting up resolver on subnet: Ipv6Subnet { net: Ipv6Net(Ipv6Network { addr: fd00:1122:3344::, prefix: 48 }) }
472023-01-20T02:09:32.178ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = GET path = /artifacts/{kind}/{name}/{version}
482023-01-20T02:09:32.182ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = POST path = /disk/{disk_id}/remove-read-only-parent
492023-01-20T02:09:32.182ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = PUT path = /disks/{disk_id}
502023-01-20T02:09:32.182ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = PUT path = /instances/{instance_id}
512023-01-20T02:09:32.183ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = GET path = /metrics/collect/{producer_id}
522023-01-20T02:09:32.183ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = POST path = /metrics/collectors
532023-01-20T02:09:32.183ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = POST path = /metrics/producers
542023-01-20T02:09:32.183ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = PUT path = /racks/{rack_id}/initialization-complete
552023-01-20T02:09:32.183ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = POST path = /sled-agents/{sled_id}
562023-01-20T02:09:32.184ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = PUT path = /sled-agents/{sled_id}/zpools/{zpool_id}
572023-01-20T02:09:32.184ZDEBGtest_instance_metrics (dropshot_internal): registered endpoint local_addr = 127.0.0.1:39385 method = POST path = /volume/{volume_id}/remove-read-only-parent
582023-01-20T02:09:32.184ZINFOtest_instance_metrics (dropshot_internal): listening local_addr = 127.0.0.1:39385
592023-01-20T02:09:32.184ZDEBGtest_instance_metrics (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:39385
602023-01-20T02:09:32.184ZINFOtest_instance_metrics (SEC): SEC running sec_id = 0532410e-45bd-48ac-9036-db9177388def
612023-01-20T02:09:32.185ZTRACtest_instance_metrics (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
622023-01-20T02:09:32.185ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
632023-01-20T02:09:32.185ZDEBGtest_instance_metrics (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
642023-01-20T02:09:32.185ZDEBGtest_instance_metrics (DataLoader): attempting to create built-in users
652023-01-20T02:09:32.186ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
662023-01-20T02:09:32.187ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
672023-01-20T02:09:32.187ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
682023-01-20T02:09:32.188ZINFOtest_instance_metrics (SagaRecoverer): start saga recovery
692023-01-20T02:09:32.195ZTRACtest_instance_metrics (SagaRecoverer): listing sagas
702023-01-20T02:09:32.268ZINFOtest_instance_metrics (DataLoader): created 5 built-in users
712023-01-20T02:09:32.268ZTRACtest_instance_metrics (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
722023-01-20T02:09:32.269ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
732023-01-20T02:09:32.274ZDEBGtest_instance_metrics (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
742023-01-20T02:09:32.274ZDEBGtest_instance_metrics (DataLoader): attempting to create built-in roles
752023-01-20T02:09:32.274ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
762023-01-20T02:09:32.274ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
772023-01-20T02:09:32.276ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
782023-01-20T02:09:32.303ZINFOtest_instance_metrics (DataLoader): created 13 built-in roles
792023-01-20T02:09:32.303ZTRACtest_instance_metrics (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
802023-01-20T02:09:32.303ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
812023-01-20T02:09:32.308ZDEBGtest_instance_metrics (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
822023-01-20T02:09:32.308ZDEBGtest_instance_metrics (DataLoader): attempting to create built-in role assignments
832023-01-20T02:09:32.309ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
842023-01-20T02:09:32.310ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
852023-01-20T02:09:32.310ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
862023-01-20T02:09:32.490ZINFOtest_instance_metrics (DataLoader): created 4 built-in role assignments
872023-01-20T02:09:32.490ZTRACtest_instance_metrics (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
882023-01-20T02:09:32.490ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
892023-01-20T02:09:32.490ZDEBGtest_instance_metrics (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
902023-01-20T02:09:32.494ZDEBGtest_instance_metrics (DataLoader): attempting to create built-in silo
912023-01-20T02:09:32.494ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
922023-01-20T02:09:32.494ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
932023-01-20T02:09:32.494ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
942023-01-20T02:09:32.525ZINFOtest_instance_metrics (SagaRecoverer): listed sagas (0 total)
952023-01-20T02:09:32.769ZINFOtest_instance_metrics (DataLoader): created 1 built-in silos
962023-01-20T02:09:32.769ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
972023-01-20T02:09:32.769ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
982023-01-20T02:09:32.769ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
992023-01-20T02:09:32.819ZTRACtest_instance_metrics (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1002023-01-20T02:09:32.819ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1012023-01-20T02:09:32.821ZDEBGtest_instance_metrics (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1022023-01-20T02:09:32.821ZDEBGtest_instance_metrics (DataLoader): attempting to create silo users
1032023-01-20T02:09:32.821ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1042023-01-20T02:09:32.822ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1052023-01-20T02:09:32.822ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1062023-01-20T02:09:32.874ZINFOtest_instance_metrics (DataLoader): created 2 silo users
1072023-01-20T02:09:32.875ZDEBGtest_instance_metrics (DataLoader): attempting to create silo user role assignments
1082023-01-20T02:09:32.875ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1092023-01-20T02:09:32.876ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1102023-01-20T02:09:32.876ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1112023-01-20T02:09:32.973ZINFOtest_instance_metrics (DataLoader): created 2 silo user role assignments
1122023-01-20T02:09:32.975ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1132023-01-20T02:09:32.975ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1142023-01-20T02:09:32.975ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1152023-01-20T02:09:32.983ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1162023-01-20T02:09:32.983ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1172023-01-20T02:09:32.984ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1182023-01-20T02:09:33.019ZTRACtest_instance_metrics (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
1192023-01-20T02:09:33.019ZTRACtest_instance_metrics (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1202023-01-20T02:09:33.020ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1212023-01-20T02:09:33.020ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1222023-01-20T02:09:33.021ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1232023-01-20T02:09:33.026ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1242023-01-20T02:09:33.030ZDEBGtest_instance_metrics (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
1252023-01-20T02:09:33.030ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1262023-01-20T02:09:33.030ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1272023-01-20T02:09:33.031ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1282023-01-20T02:09:33.071ZTRACtest_instance_metrics (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
1292023-01-20T02:09:33.071ZTRACtest_instance_metrics (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1302023-01-20T02:09:33.072ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1312023-01-20T02:09:33.072ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1322023-01-20T02:09:33.078ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1332023-01-20T02:09:33.080ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1342023-01-20T02:09:33.086ZDEBGtest_instance_metrics (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
1352023-01-20T02:09:33.087ZTRACtest_instance_metrics (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1362023-01-20T02:09:33.087ZDEBGtest_instance_metrics (DataLoader): roles roles = RoleSet { roles: {} }
1372023-01-20T02:09:33.089ZDEBGtest_instance_metrics (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1382023-01-20T02:09:33.098ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Fleet
1392023-01-20T02:09:33.099ZTRACtest_instance_metrics (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1402023-01-20T02:09:33.099ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
1412023-01-20T02:09:33.099ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {} }
1422023-01-20T02:09:33.108ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
1432023-01-20T02:09:33.111ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
1442023-01-20T02:09:33.116ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Fleet result = Ok(())
1452023-01-20T02:09:33.116ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
1462023-01-20T02:09:33.116ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {} }
1472023-01-20T02:09:33.117ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
1482023-01-20T02:09:33.119ZINFOtest_instance_metrics (ServiceBalancer): Inserted services
1492023-01-20T02:09:33.121ZINFOtest_instance_metrics (ServiceBalancer): Inserted datasets
1502023-01-20T02:09:33.133ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
1512023-01-20T02:09:33.133ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {} }
1522023-01-20T02:09:33.134ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
1532023-01-20T02:09:33.143ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
1542023-01-20T02:09:33.144ZTRACtest_instance_metrics (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1552023-01-20T02:09:33.145ZTRACtest_instance_metrics (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
1562023-01-20T02:09:33.145ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {} }
1572023-01-20T02:09:33.146ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
1582023-01-20T02:09:33.148ZDEBGtest_instance_metrics (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
1592023-01-20T02:09:33.160ZDEBGtest_instance_metrics (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
1602023-01-20T02:09:33.161ZINFOtest_instance_metrics (nexus): Rack initialized
1612023-01-20T02:09:33.223ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /
1622023-01-20T02:09:33.224ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /assets/{path}
1632023-01-20T02:09:33.224ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/disks/{id}
1642023-01-20T02:09:33.224ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/images/{id}
1652023-01-20T02:09:33.224ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/instances/{id}
1662023-01-20T02:09:33.224ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/network-interfaces/{id}
1672023-01-20T02:09:33.225ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/organizations/{id}
1682023-01-20T02:09:33.225ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/projects/{id}
1692023-01-20T02:09:33.225ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/snapshots/{id}
1702023-01-20T02:09:33.225ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/vpc-router-routes/{id}
1712023-01-20T02:09:33.225ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/vpc-routers/{id}
1722023-01-20T02:09:33.226ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/vpc-subnets/{id}
1732023-01-20T02:09:33.227ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /by-id/vpcs/{id}
1742023-01-20T02:09:33.227ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /device/auth
1752023-01-20T02:09:33.227ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /device/confirm
1762023-01-20T02:09:33.227ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /device/success
1772023-01-20T02:09:33.228ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /device/token
1782023-01-20T02:09:33.228ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /device/verify
1792023-01-20T02:09:33.228ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /groups
1802023-01-20T02:09:33.228ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /login
1812023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /login
1822023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /login/{silo_name}/local
1832023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /login/{silo_name}/saml/{provider_name}
1842023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /login/{silo_name}/saml/{provider_name}
1852023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /logout
1862023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations
1872023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations
1882023-01-20T02:09:33.229ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}
1892023-01-20T02:09:33.230ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}
1902023-01-20T02:09:33.230ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}
1912023-01-20T02:09:33.230ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/policy
1922023-01-20T02:09:33.231ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/policy
1932023-01-20T02:09:33.231ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects
1942023-01-20T02:09:33.232ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects
1952023-01-20T02:09:33.232ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}
1962023-01-20T02:09:33.232ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}
1972023-01-20T02:09:33.232ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}
1982023-01-20T02:09:33.232ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/disks
1992023-01-20T02:09:33.233ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/disks
2002023-01-20T02:09:33.233ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/disks/{disk_name}
2012023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/disks/{disk_name}
2022023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/disks/{disk_name}/metrics/{metric_name}
2032023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/images
2042023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/images
2052023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/images/{image_name}
2062023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/images/{image_name}
2072023-01-20T02:09:33.234ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances
2082023-01-20T02:09:33.235ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances
2092023-01-20T02:09:33.235ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}
2102023-01-20T02:09:33.235ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}
2112023-01-20T02:09:33.235ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/disks
2122023-01-20T02:09:33.235ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/disks/attach
2132023-01-20T02:09:33.236ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/disks/detach
2142023-01-20T02:09:33.237ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/external-ips
2152023-01-20T02:09:33.237ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/migrate
2162023-01-20T02:09:33.237ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/network-interfaces
2172023-01-20T02:09:33.237ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/network-interfaces
2182023-01-20T02:09:33.238ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/network-interfaces/{interface_name}
2192023-01-20T02:09:33.238ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/network-interfaces/{interface_name}
2202023-01-20T02:09:33.239ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/network-interfaces/{interface_name}
2212023-01-20T02:09:33.239ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/reboot
2222023-01-20T02:09:33.240ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/serial-console
2232023-01-20T02:09:33.240ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/serial-console/stream
2242023-01-20T02:09:33.240ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/start
2252023-01-20T02:09:33.241ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/instances/{instance_name}/stop
2262023-01-20T02:09:33.241ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/policy
2272023-01-20T02:09:33.242ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/policy
2282023-01-20T02:09:33.242ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/snapshots
2292023-01-20T02:09:33.242ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/snapshots
2302023-01-20T02:09:33.242ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/snapshots/{snapshot_name}
2312023-01-20T02:09:33.243ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/snapshots/{snapshot_name}
2322023-01-20T02:09:33.243ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs
2332023-01-20T02:09:33.243ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/vpcs
2342023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}
2352023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}
2362023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}
2372023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/firewall/rules
2382023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/firewall/rules
2392023-01-20T02:09:33.244ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers
2402023-01-20T02:09:33.245ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers
2412023-01-20T02:09:33.245ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}
2422023-01-20T02:09:33.246ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}
2432023-01-20T02:09:33.246ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}
2442023-01-20T02:09:33.246ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}/routes
2452023-01-20T02:09:33.246ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}/routes
2462023-01-20T02:09:33.247ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}/routes/{route_name}
2472023-01-20T02:09:33.247ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}/routes/{route_name}
2482023-01-20T02:09:33.247ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/routers/{router_name}/routes/{route_name}
2492023-01-20T02:09:33.247ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets
2502023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets
2512023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets/{subnet_name}
2522023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets/{subnet_name}
2532023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets/{subnet_name}
2542023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /organizations/{organization_name}/projects/{project_name}/vpcs/{vpc_name}/subnets/{subnet_name}/network-interfaces
2552023-01-20T02:09:33.248ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /orgs/{path}
2562023-01-20T02:09:33.249ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /policy
2572023-01-20T02:09:33.249ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /policy
2582023-01-20T02:09:33.250ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /roles
2592023-01-20T02:09:33.250ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /roles/{role_name}
2602023-01-20T02:09:33.250ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /session/me
2612023-01-20T02:09:33.250ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /session/me/groups
2622023-01-20T02:09:33.251ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /session/me/sshkeys
2632023-01-20T02:09:33.251ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /session/me/sshkeys
2642023-01-20T02:09:33.252ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /session/me/sshkeys/{ssh_key_name}
2652023-01-20T02:09:33.253ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /session/me/sshkeys/{ssh_key_name}
2662023-01-20T02:09:33.253ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /settings/{path}
2672023-01-20T02:09:33.253ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /spoof_login
2682023-01-20T02:09:33.253ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /sys/{path}
2692023-01-20T02:09:33.253ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/by-id/images/{id}
2702023-01-20T02:09:33.254ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/by-id/ip-pools/{id}
2712023-01-20T02:09:33.254ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/by-id/silos/{id}
2722023-01-20T02:09:33.254ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/hardware/racks
2732023-01-20T02:09:33.254ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/hardware/racks/{rack_id}
2742023-01-20T02:09:33.254ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/hardware/sleds
2752023-01-20T02:09:33.255ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/hardware/sleds/{sled_id}
2762023-01-20T02:09:33.256ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/images
2772023-01-20T02:09:33.256ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/images
2782023-01-20T02:09:33.256ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /system/images/{image_name}
2792023-01-20T02:09:33.256ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/images/{image_name}
2802023-01-20T02:09:33.257ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/ip-pools
2812023-01-20T02:09:33.257ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/ip-pools
2822023-01-20T02:09:33.257ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /system/ip-pools/{pool_name}
2832023-01-20T02:09:33.257ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/ip-pools/{pool_name}
2842023-01-20T02:09:33.258ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /system/ip-pools/{pool_name}
2852023-01-20T02:09:33.258ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/ip-pools/{pool_name}/ranges
2862023-01-20T02:09:33.259ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/ip-pools/{pool_name}/ranges/add
2872023-01-20T02:09:33.259ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/ip-pools/{pool_name}/ranges/remove
2882023-01-20T02:09:33.259ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/ip-pools-service
2892023-01-20T02:09:33.259ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/ip-pools-service/ranges
2902023-01-20T02:09:33.259ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/ip-pools-service/ranges/add
2912023-01-20T02:09:33.260ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/ip-pools-service/ranges/remove
2922023-01-20T02:09:33.260ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/metrics/{metric_name}
2932023-01-20T02:09:33.260ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/policy
2942023-01-20T02:09:33.260ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = PUT path = /system/policy
2952023-01-20T02:09:33.265ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/sagas
2962023-01-20T02:09:33.266ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/sagas/{saga_id}
2972023-01-20T02:09:33.266ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = GET path = /system/silos
2982023-01-20T02:09:33.266ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = POST path = /system/silos
2992023-01-20T02:09:33.266ZDEBGtest_instance_metrics (dropshot_external): registered endpoint local_addr = 127.0.0.1:32979 method = DELETE path = /system/silos/{silo_name}
3002023-01-20T02:09:33.266ZERROtest_instance_metrics (dropshot_external): slog-async: logger dropped messages due to channel overflow count = 73 local_addr = 127.0.0.1:32979
3012023-01-20T02:09:33.266ZERROtest_instance_metrics (omicron_sled_agent::sim::Server): slog-async: logger dropped messages due to channel overflow count = 23 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3022023-01-20T02:09:33.267ZERROtest_instance_metrics (SledAgent): slog-async: logger dropped messages due to channel overflow count = 1 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3032023-01-20T02:09:33.267ZINFOtest_instance_metrics (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3042023-01-20T02:09:33.268ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3052023-01-20T02:09:33.268ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3062023-01-20T02:09:33.270ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = POST path = /disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3072023-01-20T02:09:33.270ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = PUT path = /instances/{instance_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3082023-01-20T02:09:33.270ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = POST path = /instances/{instance_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3092023-01-20T02:09:33.270ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = POST path = /instances/{instance_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3102023-01-20T02:09:33.270ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = GET path = /instances/{instance_id}/serial sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3112023-01-20T02:09:33.271ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = POST path = /update sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3122023-01-20T02:09:33.271ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:35063 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3132023-01-20T02:09:33.271ZINFOtest_instance_metrics (dropshot): listening local_addr = [::1]:35063 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3142023-01-20T02:09:33.272ZDEBGtest_instance_metrics (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:35063 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3152023-01-20T02:09:33.272ZDEBGtest_instance_metrics (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3162023-01-20T02:09:33.272ZDEBGtest_instance_metrics (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:39385/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
3172023-01-20T02:09:33.273ZINFOtest_instance_metrics (dropshot_internal): accepted connection local_addr = 127.0.0.1:39385 remote_addr = 127.0.0.1:60844
3182023-01-20T02:09:33.273ZTRACtest_instance_metrics (dropshot_internal): incoming request local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60844 req_id = 848085b2-28d3-42b8-97c8-174b469ead5d uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
3192023-01-20T02:09:33.273ZINFOtest_instance_metrics (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
3202023-01-20T02:09:33.311ZINFOtest_instance_metrics (dropshot_internal): request completed local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60844 req_id = 848085b2-28d3-42b8-97c8-174b469ead5d response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
3212023-01-20T02:09:33.312ZDEBGtest_instance_metrics (NexusClient): client response result = Ok(Response { url: Url { scheme: "http", cannot_be_a_base: false, username: "", password: None, host: Some(Ipv4(127.0.0.1)), port: Some(39385), path: "/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", query: None, fragment: None }, status: 204, headers: {"x-request-id": "848085b2-28d3-42b8-97c8-174b469ead5d", "date": "Fri, 20 Jan 2023 02:09:33 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
3222023-01-20T02:09:33.312ZDEBGtest_instance_metrics (oximeter): registered DTrace probes
3232023-01-20T02:09:33.312ZINFOtest_instance_metrics (oximeter): starting oximeter server
3242023-01-20T02:09:33.313ZDEBGtest_instance_metrics (oximeter): creating ClickHouse client
3252023-01-20T02:09:33.336ZDEBGtest_instance_metrics (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3262023-01-20T02:09:33.336ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE DATABASE IF NOT EXISTS oximeter; collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3272023-01-20T02:09:33.347ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_bool ( timeseries_name String, timeseries_key UInt64, timestamp DateTime64(9, 'UTC'), datum UInt8 ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3282023-01-20T02:09:33.358ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_i64 ( timeseries_name String, timeseries_key UInt64, timestamp DateTime64(9, 'UTC'), datum Int64 ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3292023-01-20T02:09:33.374ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_f64 ( timeseries_name String, timeseries_key UInt64, timestamp DateTime64(9, 'UTC'), datum Float64 ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3302023-01-20T02:09:33.384ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_string ( timeseries_name String, timeseries_key UInt64, timestamp DateTime64(9, 'UTC'), datum String ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3312023-01-20T02:09:33.397ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_bytes ( timeseries_name String, timeseries_key UInt64, timestamp DateTime64(9, 'UTC'), datum Array(UInt8) ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3322023-01-20T02:09:33.411ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64 ( timeseries_name String, timeseries_key UInt64, start_time DateTime64(9, 'UTC'), timestamp DateTime64(9, 'UTC'), datum Int64 ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, start_time, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3332023-01-20T02:09:33.425ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64 ( timeseries_name String, timeseries_key UInt64, start_time DateTime64(9, 'UTC'), timestamp DateTime64(9, 'UTC'), datum Float64 ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, start_time, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3342023-01-20T02:09:33.443ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64 ( timeseries_name String, timeseries_key UInt64, start_time DateTime64(9, 'UTC'), timestamp DateTime64(9, 'UTC'), bins Array(Int64), counts Array(UInt64) ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, start_time, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3352023-01-20T02:09:33.460ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64 ( timeseries_name String, timeseries_key UInt64, start_time DateTime64(9, 'UTC'), timestamp DateTime64(9, 'UTC'), bins Array(Float64), counts Array(UInt64) ) ENGINE = MergeTree() ORDER BY (timeseries_name, timeseries_key, start_time, timestamp); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3362023-01-20T02:09:33.475ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.fields_bool ( timeseries_name String, timeseries_key UInt64, field_name String, field_value UInt8 ) ENGINE = ReplacingMergeTree() ORDER BY (timeseries_name, field_name, field_value, timeseries_key); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3372023-01-20T02:09:33.493ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.fields_i64 ( timeseries_name String, timeseries_key UInt64, field_name String, field_value Int64 ) ENGINE = ReplacingMergeTree() ORDER BY (timeseries_name, field_name, field_value, timeseries_key); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3382023-01-20T02:09:33.512ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr ( timeseries_name String, timeseries_key UInt64, field_name String, field_value IPv6 ) ENGINE = ReplacingMergeTree() ORDER BY (timeseries_name, field_name, field_value, timeseries_key); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3392023-01-20T02:09:33.526ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.fields_string ( timeseries_name String, timeseries_key UInt64, field_name String, field_value String ) ENGINE = ReplacingMergeTree() ORDER BY (timeseries_name, field_name, field_value, timeseries_key); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3402023-01-20T02:09:33.538ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.fields_uuid ( timeseries_name String, timeseries_key UInt64, field_name String, field_value UUID ) ENGINE = ReplacingMergeTree() ORDER BY (timeseries_name, field_name, field_value, timeseries_key); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3412023-01-20T02:09:33.553ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: CREATE TABLE IF NOT EXISTS oximeter.timeseries_schema ( timeseries_name String, fields Nested( name String, type Enum( 'Bool' = 1, 'I64' = 2, 'IpAddr' = 3, 'String' = 4, 'Uuid' = 6 ), source Enum( 'Target' = 1, 'Metric' = 2 ) ), datum_type Enum( 'Bool' = 1, 'I64' = 2, 'F64' = 3, 'String' = 4, 'Bytes' = 5, 'CumulativeI64' = 6, 'CumulativeF64' = 7, 'HistogramI64' = 8, 'HistogramF64' = 9 ), created DateTime64(9, 'UTC') ) ENGINE = MergeTree() ORDER BY (timeseries_name, fields.name); collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
3422023-01-20T02:09:33.567ZDEBGtest_instance_metrics (dropshot): registered endpoint local_addr = [::1]:37507 method = POST path = /producers
3432023-01-20T02:09:33.567ZINFOtest_instance_metrics (dropshot): listening local_addr = [::1]:37507
3442023-01-20T02:09:33.567ZDEBGtest_instance_metrics (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:37507
3452023-01-20T02:09:33.580ZDEBGtest_instance_metrics (oximeter): contacting nexus
3462023-01-20T02:09:33.581ZINFOtest_instance_metrics (dropshot_internal): accepted connection local_addr = 127.0.0.1:39385 remote_addr = 127.0.0.1:60846
3472023-01-20T02:09:33.586ZTRACtest_instance_metrics (dropshot_internal): incoming request local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60846 req_id = c86e2129-ef90-49f8-97f5-418f10d0299c uri = /metrics/collectors
3482023-01-20T02:09:33.620ZINFOtest_instance_metrics (nexus): registered new oximeter metric collection server address = [::1]:37507 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
3492023-01-20T02:09:33.654ZINFOtest_instance_metrics (dropshot_internal): request completed local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60846 req_id = c86e2129-ef90-49f8-97f5-418f10d0299c response_code = 204 uri = /metrics/collectors
3502023-01-20T02:09:33.654ZINFOtest_instance_metrics (oximeter): oximeter registered with nexus id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
3512023-01-20T02:09:33.666ZINFOtest_instance_metrics (dropshot_internal): accepted connection local_addr = 127.0.0.1:39385 remote_addr = 127.0.0.1:60848
3522023-01-20T02:09:33.666ZTRACtest_instance_metrics (dropshot_internal): incoming request local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60848 req_id = b2cbb409-e1db-4872-a64d-5b212f065ed0 uri = /metrics/producers
3532023-01-20T02:09:33.678ZINFOtest_instance_metrics (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
3542023-01-20T02:09:33.705ZDEBGtest_instance_metrics (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:37507/producers
3552023-01-20T02:09:33.705ZINFOtest_instance_metrics (dropshot): accepted connection local_addr = [::1]:37507 remote_addr = [::1]:46516
3562023-01-20T02:09:33.706ZTRACtest_instance_metrics (dropshot): incoming request local_addr = [::1]:37507 method = POST remote_addr = [::1]:46516 req_id = 14a581e9-57fd-4a5b-8b30-cc37b58ee321 uri = /producers
3572023-01-20T02:09:33.706ZINFOtest_instance_metrics (oximeter-agent): registered new metric producer address = [::1]:34263 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
3582023-01-20T02:09:33.707ZINFOtest_instance_metrics (dropshot): request completed local_addr = [::1]:37507 method = POST remote_addr = [::1]:46516 req_id = 14a581e9-57fd-4a5b-8b30-cc37b58ee321 response_code = 204 uri = /producers
3592023-01-20T02:09:33.719ZDEBGtest_instance_metrics (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: Url { scheme: "http", cannot_be_a_base: false, username: "", password: None, host: Some(Ipv6(::1)), port: Some(37507), path: "/producers", query: None, fragment: None }, status: 204, headers: {"x-request-id": "14a581e9-57fd-4a5b-8b30-cc37b58ee321", "date": "Fri, 20 Jan 2023 02:09:33 GMT"} })
3602023-01-20T02:09:33.720ZINFOtest_instance_metrics (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
3612023-01-20T02:09:33.721ZINFOtest_instance_metrics (dropshot_internal): request completed local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60848 req_id = b2cbb409-e1db-4872-a64d-5b212f065ed0 response_code = 204 uri = /metrics/producers
3622023-01-20T02:09:33.721ZDEBGtest_instance_metrics (collection-task): starting oximeter collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 interval = 1s producer_id = a6458b7d-87c3-4483-be96-854d814c20de
3632023-01-20T02:09:33.723ZDEBGtest_instance_metrics (nexus): registering nexus as metric producer
3642023-01-20T02:09:33.731ZDEBGtest_instance_metrics (nexus): client request body = Some(Body) method = POST uri = http://127.0.0.1:39385/metrics/producers
3652023-01-20T02:09:33.732ZINFOtest_instance_metrics (dropshot_internal): accepted connection local_addr = 127.0.0.1:39385 remote_addr = 127.0.0.1:60852
3662023-01-20T02:09:33.732ZTRACtest_instance_metrics (dropshot_internal): incoming request local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60852 req_id = cb5684b9-a2c6-4d27-b3f6-05c9b5feb295 uri = /metrics/producers
3672023-01-20T02:09:33.744ZINFOtest_instance_metrics (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
3682023-01-20T02:09:33.757ZDEBGtest_instance_metrics (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:37507/producers
3692023-01-20T02:09:33.757ZINFOtest_instance_metrics (dropshot): accepted connection local_addr = [::1]:37507 remote_addr = [::1]:46518
3702023-01-20T02:09:33.759ZTRACtest_instance_metrics (dropshot): incoming request local_addr = [::1]:37507 method = POST remote_addr = [::1]:46518 req_id = 72ec8cc6-aae7-4e08-ae91-e6e7710b52f5 uri = /producers
3712023-01-20T02:09:33.760ZINFOtest_instance_metrics (oximeter-agent): registered new metric producer address = 127.0.0.1:39385 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 0532410e-45bd-48ac-9036-db9177388def
3722023-01-20T02:09:33.760ZINFOtest_instance_metrics (dropshot): request completed local_addr = [::1]:37507 method = POST remote_addr = [::1]:46518 req_id = 72ec8cc6-aae7-4e08-ae91-e6e7710b52f5 response_code = 204 uri = /producers
3732023-01-20T02:09:33.771ZDEBGtest_instance_metrics (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: Url { scheme: "http", cannot_be_a_base: false, username: "", password: None, host: Some(Ipv6(::1)), port: Some(37507), path: "/producers", query: None, fragment: None }, status: 204, headers: {"x-request-id": "72ec8cc6-aae7-4e08-ae91-e6e7710b52f5", "date": "Fri, 20 Jan 2023 02:09:33 GMT"} })
3742023-01-20T02:09:33.771ZINFOtest_instance_metrics (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 0532410e-45bd-48ac-9036-db9177388def
3752023-01-20T02:09:33.781ZINFOtest_instance_metrics (dropshot_internal): request completed local_addr = 127.0.0.1:39385 method = POST remote_addr = 127.0.0.1:60852 req_id = cb5684b9-a2c6-4d27-b3f6-05c9b5feb295 response_code = 204 uri = /metrics/producers
3762023-01-20T02:09:33.793ZDEBGtest_instance_metrics (collection-task): starting oximeter collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 interval = 10s producer_id = 0532410e-45bd-48ac-9036-db9177388def
3772023-01-20T02:09:33.793ZDEBGtest_instance_metrics (nexus): client response result = Ok(Response { url: Url { scheme: "http", cannot_be_a_base: false, username: "", password: None, host: Some(Ipv4(127.0.0.1)), port: Some(39385), path: "/metrics/producers", query: None, fragment: None }, status: 204, headers: {"x-request-id": "cb5684b9-a2c6-4d27-b3f6-05c9b5feb295", "date": "Fri, 20 Jan 2023 02:09:33 GMT"} })
3782023-01-20T02:09:33.794ZINFOtest_instance_metrics (external client test context): client request body = Body(Full(b"{\\"first\\":\\"10.0.0.0\\",\\"last\\":\\"10.0.255.255\\"}")) method = POST uri = http://127.0.0.1:32979/system/ip-pools/default/ranges/add
3792023-01-20T02:09:33.794ZINFOtest_instance_metrics (dropshot_external): accepted connection local_addr = 127.0.0.1:32979 remote_addr = 127.0.0.1:41114
3802023-01-20T02:09:33.794ZTRACtest_instance_metrics (dropshot_external): incoming request local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 uri = /system/ip-pools/default/ranges/add
3812023-01-20T02:09:33.794ZTRACtest_instance_metrics (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 uri = /system/ip-pools/default/ranges/add
3822023-01-20T02:09:33.794ZDEBGtest_instance_metrics (dropshot_external): looking up silo for user local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /system/ip-pools/default/ranges/add
3832023-01-20T02:09:33.794ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
3842023-01-20T02:09:33.795ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
3852023-01-20T02:09:33.795ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
3862023-01-20T02:09:33.795ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
3872023-01-20T02:09:33.795ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
3882023-01-20T02:09:33.795ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
3892023-01-20T02:09:33.798ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
3902023-01-20T02:09:33.798ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
3912023-01-20T02:09:33.798ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
3922023-01-20T02:09:33.798ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
3932023-01-20T02:09:33.799ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
3942023-01-20T02:09:33.805ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3952023-01-20T02:09:33.805ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
3962023-01-20T02:09:33.805ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
3972023-01-20T02:09:33.805ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
3982023-01-20T02:09:33.808ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
3992023-01-20T02:09:33.815ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
4002023-01-20T02:09:33.815ZTRACtest_instance_metrics (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 uri = /system/ip-pools/default/ranges/add
4012023-01-20T02:09:33.816ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database uri = /system/ip-pools/default/ranges/add
4022023-01-20T02:09:33.816ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {} } uri = /system/ip-pools/default/ranges/add
4032023-01-20T02:09:33.817ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database result = Ok(()) uri = /system/ip-pools/default/ranges/add
4042023-01-20T02:09:33.822ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = IpPool { parent: Fleet, key: 190092af-07fd-4105-9a25-fc27699fb086, lookup_type: ByName("default") } uri = /system/ip-pools/default/ranges/add
4052023-01-20T02:09:33.822ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /system/ip-pools/default/ranges/add
4062023-01-20T02:09:33.822ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database uri = /system/ip-pools/default/ranges/add
4072023-01-20T02:09:33.823ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {} } uri = /system/ip-pools/default/ranges/add
4082023-01-20T02:09:33.824ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database result = Ok(()) uri = /system/ip-pools/default/ranges/add
4092023-01-20T02:09:33.841ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /system/ip-pools/default/ranges/add
4102023-01-20T02:09:33.849ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = IpPool { parent: Fleet, key: 190092af-07fd-4105-9a25-fc27699fb086, lookup_type: ByName("default") } result = Ok(()) uri = /system/ip-pools/default/ranges/add
4112023-01-20T02:09:33.850ZTRACtest_instance_metrics (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = IpPool { parent: Fleet, key: 190092af-07fd-4105-9a25-fc27699fb086, lookup_type: ByName("default") } uri = /system/ip-pools/default/ranges/add
4122023-01-20T02:09:33.850ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /system/ip-pools/default/ranges/add
4132023-01-20T02:09:33.850ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database uri = /system/ip-pools/default/ranges/add
4142023-01-20T02:09:33.851ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {} } uri = /system/ip-pools/default/ranges/add
4152023-01-20T02:09:33.852ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database result = Ok(()) uri = /system/ip-pools/default/ranges/add
4162023-01-20T02:09:33.860ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /system/ip-pools/default/ranges/add
4172023-01-20T02:09:33.866ZDEBGtest_instance_metrics (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = IpPool { parent: Fleet, key: 190092af-07fd-4105-9a25-fc27699fb086, lookup_type: ByName("default") } result = Ok(()) uri = /system/ip-pools/default/ranges/add
4182023-01-20T02:09:33.866ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database uri = /system/ip-pools/default/ranges/add
4192023-01-20T02:09:33.866ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 roles = RoleSet { roles: {} } uri = /system/ip-pools/default/ranges/add
4202023-01-20T02:09:33.867ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 resource = Database result = Ok(()) uri = /system/ip-pools/default/ranges/add
4212023-01-20T02:09:33.961ZINFOtest_instance_metrics (dropshot_external): request completed local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = c9045576-f563-4150-8fa3-5c8b231966e6 response_code = 201 uri = /system/ip-pools/default/ranges/add
4222023-01-20T02:09:33.965ZINFOtest_instance_metrics (external client test context): client received response status = 201
4232023-01-20T02:09:33.965ZINFOtest_instance_metrics (external client test context): client request body = Body(Full(b"{\\"name\\":\\"test-org\\",\\"description\\":\\"an org\\"}")) method = POST uri = http://127.0.0.1:32979/v1/organizations
4242023-01-20T02:09:33.965ZTRACtest_instance_metrics (dropshot_external): incoming request local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 uri = /v1/organizations
4252023-01-20T02:09:33.965ZTRACtest_instance_metrics (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 uri = /v1/organizations
4262023-01-20T02:09:33.965ZDEBGtest_instance_metrics (dropshot_external): looking up silo for user local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/organizations
4272023-01-20T02:09:33.965ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4282023-01-20T02:09:33.966ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4292023-01-20T02:09:33.966ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4302023-01-20T02:09:33.971ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4312023-01-20T02:09:33.971ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4322023-01-20T02:09:33.971ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4332023-01-20T02:09:33.982ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
4342023-01-20T02:09:33.982ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
4352023-01-20T02:09:33.982ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4362023-01-20T02:09:33.983ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4372023-01-20T02:09:33.983ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4382023-01-20T02:09:33.986ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4392023-01-20T02:09:33.986ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4402023-01-20T02:09:33.986ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4412023-01-20T02:09:33.989ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4422023-01-20T02:09:33.995ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
4432023-01-20T02:09:34.001ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
4442023-01-20T02:09:34.002ZTRACtest_instance_metrics (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 uri = /v1/organizations
4452023-01-20T02:09:34.002ZTRACtest_instance_metrics (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/organizations
4462023-01-20T02:09:34.002ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/organizations
4472023-01-20T02:09:34.002ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database uri = /v1/organizations
4482023-01-20T02:09:34.002ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 roles = RoleSet { roles: {} } uri = /v1/organizations
4492023-01-20T02:09:34.003ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database result = Ok(()) uri = /v1/organizations
4502023-01-20T02:09:34.023ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/organizations
4512023-01-20T02:09:34.024ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database uri = /v1/organizations
4522023-01-20T02:09:34.024ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 roles = RoleSet { roles: {} } uri = /v1/organizations
4532023-01-20T02:09:34.026ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database result = Ok(()) uri = /v1/organizations
4542023-01-20T02:09:34.041ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/organizations
4552023-01-20T02:09:34.055ZDEBGtest_instance_metrics (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/organizations
4562023-01-20T02:09:34.058ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database uri = /v1/organizations
4572023-01-20T02:09:34.059ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 roles = RoleSet { roles: {} } uri = /v1/organizations
4582023-01-20T02:09:34.059ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 resource = Database result = Ok(()) uri = /v1/organizations
4592023-01-20T02:09:34.108ZINFOtest_instance_metrics (dropshot_external): request completed local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = f7bbee78-99e2-4cf1-9ad3-8b0f206b7a95 response_code = 201 uri = /v1/organizations
4602023-01-20T02:09:34.112ZINFOtest_instance_metrics (external client test context): client received response status = 201
4612023-01-20T02:09:34.112ZINFOtest_instance_metrics (external client test context): client request body = Body(Full(b"{\\"name\\":\\"springfield-squidport\\",\\"description\\":\\"a pier\\"}")) method = POST uri = http://127.0.0.1:32979/v1/projects?organization=test-org
4622023-01-20T02:09:34.112ZTRACtest_instance_metrics (dropshot_external): incoming request local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 uri = /v1/projects?organization=test-org
4632023-01-20T02:09:34.113ZTRACtest_instance_metrics (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 uri = /v1/projects?organization=test-org
4642023-01-20T02:09:34.113ZDEBGtest_instance_metrics (dropshot_external): looking up silo for user local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects?organization=test-org
4652023-01-20T02:09:34.114ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4662023-01-20T02:09:34.114ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4672023-01-20T02:09:34.115ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4682023-01-20T02:09:34.115ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4692023-01-20T02:09:34.115ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4702023-01-20T02:09:34.115ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4712023-01-20T02:09:34.119ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
4722023-01-20T02:09:34.119ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
4732023-01-20T02:09:34.119ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4742023-01-20T02:09:34.119ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4752023-01-20T02:09:34.123ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4762023-01-20T02:09:34.123ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4772023-01-20T02:09:34.123ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
4782023-01-20T02:09:34.123ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
4792023-01-20T02:09:34.127ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
4802023-01-20T02:09:34.131ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
4812023-01-20T02:09:34.137ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
4822023-01-20T02:09:34.138ZTRACtest_instance_metrics (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 uri = /v1/projects?organization=test-org
4832023-01-20T02:09:34.138ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database uri = /v1/projects?organization=test-org
4842023-01-20T02:09:34.139ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {} } uri = /v1/projects?organization=test-org
4852023-01-20T02:09:34.139ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database result = Ok(()) uri = /v1/projects?organization=test-org
4862023-01-20T02:09:34.141ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database uri = /v1/projects?organization=test-org
4872023-01-20T02:09:34.141ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {} } uri = /v1/projects?organization=test-org
4882023-01-20T02:09:34.142ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database result = Ok(()) uri = /v1/projects?organization=test-org
4892023-01-20T02:09:34.145ZTRACtest_instance_metrics (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") } uri = /v1/projects?organization=test-org
4902023-01-20T02:09:34.152ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization uri = /v1/projects?organization=test-org
4912023-01-20T02:09:34.152ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database uri = /v1/projects?organization=test-org
4922023-01-20T02:09:34.152ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {} } uri = /v1/projects?organization=test-org
4932023-01-20T02:09:34.152ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database result = Ok(()) uri = /v1/projects?organization=test-org
4942023-01-20T02:09:34.153ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects?organization=test-org
4952023-01-20T02:09:34.163ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database uri = /v1/projects?organization=test-org
4962023-01-20T02:09:34.163ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {} } uri = /v1/projects?organization=test-org
4972023-01-20T02:09:34.163ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database result = Ok(()) uri = /v1/projects?organization=test-org
4982023-01-20T02:09:34.163ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects?organization=test-org
4992023-01-20T02:09:34.164ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database uri = /v1/projects?organization=test-org
5002023-01-20T02:09:34.164ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {} } uri = /v1/projects?organization=test-org
5012023-01-20T02:09:34.164ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Database result = Ok(()) uri = /v1/projects?organization=test-org
5022023-01-20T02:09:34.167ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects?organization=test-org
5032023-01-20T02:09:34.177ZDEBGtest_instance_metrics (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 resource = Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") } result = Ok(()) uri = /v1/projects?organization=test-org
5042023-01-20T02:09:34.178ZDEBGtest_instance_metrics (SEC): saga create dag = {"end_node":15,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[2,3,null],[12,13,null],[14,0,null],[13,15,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultRouteId","name":"default_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_route","label":"VpcCreateRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_org":{"key":"abfd948c-1b18-4d39-adfa-87a5027575eb","lookup_type":{"ByName":"test-org"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}}}}}}},"End"]},"saga_name":"project-create","start_node":14} saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create sec_id = 0532410e-45bd-48ac-9036-db9177388def
5052023-01-20T02:09:34.180ZINFOtest_instance_metrics (SecStore): creating saga saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create
5062023-01-20T02:09:34.214ZDEBGtest_instance_metrics (SEC): saga log event new_state = N014 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5072023-01-20T02:09:34.214ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 14 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5082023-01-20T02:09:34.246ZDEBGtest_instance_metrics (SEC): saga log event new_state = N014 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5092023-01-20T02:09:34.246ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5102023-01-20T02:09:34.252ZDEBGtest_instance_metrics (SEC): saga log event new_state = N000 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5112023-01-20T02:09:34.252ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 0 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5122023-01-20T02:09:34.257ZTRACtest_instance_metrics (nexus): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5132023-01-20T02:09:34.257ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5142023-01-20T02:09:34.257ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5152023-01-20T02:09:34.258ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5162023-01-20T02:09:34.258ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5172023-01-20T02:09:34.263ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5182023-01-20T02:09:34.263ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5192023-01-20T02:09:34.263ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5202023-01-20T02:09:34.265ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5212023-01-20T02:09:34.269ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5222023-01-20T02:09:34.269ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5232023-01-20T02:09:34.269ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5242023-01-20T02:09:34.270ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5252023-01-20T02:09:34.279ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5262023-01-20T02:09:34.288ZDEBGtest_instance_metrics (nexus): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5272023-01-20T02:09:34.288ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5282023-01-20T02:09:34.288ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5292023-01-20T02:09:34.291ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = ProjectCreateRecord
5302023-01-20T02:09:34.346ZDEBGtest_instance_metrics (SEC): saga log event new_state = N000 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5312023-01-20T02:09:34.347ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "lookup_type": Object {"ByName": String("test-org")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"identity": Object {"description": String("a pier"), "id": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "name": String("springfield-squidport"), "time_created": String("2023-01-20T02:09:34.257163Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:34.257163Z")}, "organization_id": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "rcgen": Number(1)}]) node_id = 0 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5322023-01-20T02:09:34.355ZDEBGtest_instance_metrics (SEC): saga log event new_state = N001 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5332023-01-20T02:09:34.355ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 1 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5342023-01-20T02:09:34.364ZDEBGtest_instance_metrics (SEC): saga log event new_state = N001 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5352023-01-20T02:09:34.364ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "lookup_type": Object {"ByName": String("test-org")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, "serialized_authn": Object {"kind": Object {"Authenticated": Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd94:b5a2:aca5::/48"), "name": String("default")}}) node_id = 1 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5362023-01-20T02:09:34.370ZDEBGtest_instance_metrics (SEC): saga log event new_state = N002 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5372023-01-20T02:09:34.370ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 2 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5382023-01-20T02:09:34.380ZDEBGtest_instance_metrics (SEC): saga log event new_state = N002 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5392023-01-20T02:09:34.381ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5402023-01-20T02:09:34.385ZDEBGtest_instance_metrics (SEC): saga log event new_state = N003 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5412023-01-20T02:09:34.386ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 3 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5422023-01-20T02:09:34.391ZDEBGtest_instance_metrics (SEC): saga log event new_state = N003 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5432023-01-20T02:09:34.391ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")) node_id = 3 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5442023-01-20T02:09:34.395ZDEBGtest_instance_metrics (SEC): saga log event new_state = N004 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5452023-01-20T02:09:34.396ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 4 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5462023-01-20T02:09:34.401ZDEBGtest_instance_metrics (SEC): saga log event new_state = N004 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5472023-01-20T02:09:34.401ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(String("7b2aabe7-b73d-4b1d-ae26-aa198623b619")) node_id = 4 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5482023-01-20T02:09:34.406ZDEBGtest_instance_metrics (SEC): saga log event new_state = N005 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5492023-01-20T02:09:34.406ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 5 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5502023-01-20T02:09:34.412ZDEBGtest_instance_metrics (SEC): saga log event new_state = N005 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5512023-01-20T02:09:34.416ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(String("2fd63bc4-4e25-4014-9bf7-55b61c044670")) node_id = 5 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5522023-01-20T02:09:34.419ZDEBGtest_instance_metrics (SEC): saga log event new_state = N006 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5532023-01-20T02:09:34.419ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 6 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5542023-01-20T02:09:34.424ZDEBGtest_instance_metrics (SEC): saga log event new_state = N006 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5552023-01-20T02:09:34.424ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(String("21aa1a83-746e-4ae4-99b0-36d55ba64719")) node_id = 6 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5562023-01-20T02:09:34.429ZDEBGtest_instance_metrics (SEC): saga log event new_state = N007 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5572023-01-20T02:09:34.430ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 7 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5582023-01-20T02:09:34.435ZTRACtest_instance_metrics (nexus): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5592023-01-20T02:09:34.435ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5602023-01-20T02:09:34.436ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5612023-01-20T02:09:34.436ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5622023-01-20T02:09:34.437ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5632023-01-20T02:09:34.441ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5642023-01-20T02:09:34.441ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5652023-01-20T02:09:34.441ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5662023-01-20T02:09:34.443ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5672023-01-20T02:09:34.447ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5682023-01-20T02:09:34.447ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5692023-01-20T02:09:34.447ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5702023-01-20T02:09:34.449ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5712023-01-20T02:09:34.453ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5722023-01-20T02:09:34.453ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5732023-01-20T02:09:34.453ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5742023-01-20T02:09:34.455ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5752023-01-20T02:09:34.459ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5762023-01-20T02:09:34.472ZDEBGtest_instance_metrics (nexus): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateVpc
5772023-01-20T02:09:34.534ZDEBGtest_instance_metrics (SEC): saga log event new_state = N007 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
5782023-01-20T02:09:34.535ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "lookup_type": Object {"ByName": String("test-org")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91"), "name": String("default"), "time_created": String("2023-01-20T02:09:34.435262Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:34.435262Z")}, "ipv6_prefix": String("fd94:b5a2:aca5::/48"), "project_id": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "subnet_gen": Number(1), "system_router_id": String("7b2aabe7-b73d-4b1d-ae26-aa198623b619"), "vni": Number(2822566)}]) node_id = 7 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5792023-01-20T02:09:34.541ZDEBGtest_instance_metrics (SEC): saga log event new_state = N008 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
5802023-01-20T02:09:34.541ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 8 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
5812023-01-20T02:09:34.546ZTRACtest_instance_metrics (nexus): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5822023-01-20T02:09:34.546ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5832023-01-20T02:09:34.548ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5842023-01-20T02:09:34.548ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5852023-01-20T02:09:34.549ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5862023-01-20T02:09:34.555ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5872023-01-20T02:09:34.555ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5882023-01-20T02:09:34.555ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5892023-01-20T02:09:34.555ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5902023-01-20T02:09:34.560ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5912023-01-20T02:09:34.560ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5922023-01-20T02:09:34.560ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5932023-01-20T02:09:34.563ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5942023-01-20T02:09:34.567ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5952023-01-20T02:09:34.568ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5962023-01-20T02:09:34.568ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5972023-01-20T02:09:34.569ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5982023-01-20T02:09:34.575ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
5992023-01-20T02:09:34.595ZDEBGtest_instance_metrics (nexus): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
6002023-01-20T02:09:34.595ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
6012023-01-20T02:09:34.595ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
6022023-01-20T02:09:34.599ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRouter
6032023-01-20T02:09:34.600ZTRACtest_instance_metrics (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
6042023-01-20T02:09:34.723ZINFOtest_instance_metrics (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
6052023-01-20T02:09:34.723ZDEBGtest_instance_metrics (collection-task): collected 1 total results collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
6062023-01-20T02:09:34.733ZDEBGtest_instance_metrics (SEC): saga log event new_state = N008 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
6072023-01-20T02:09:34.733ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Object {"key": String("7b2aabe7-b73d-4b1d-ae26-aa198623b619"), "lookup_type": Object {"ById": String("7b2aabe7-b73d-4b1d-ae26-aa198623b619")}, "parent": Object {"key": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "lookup_type": Object {"ByName": String("test-org")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 8 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6082023-01-20T02:09:34.741ZDEBGtest_instance_metrics (SEC): saga log event new_state = N009 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
6092023-01-20T02:09:34.741ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 9 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6102023-01-20T02:09:34.754ZTRACtest_instance_metrics (nexus): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") }, key: 7b2aabe7-b73d-4b1d-ae26-aa198623b619, lookup_type: ById(7b2aabe7-b73d-4b1d-ae26-aa198623b619) } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6112023-01-20T02:09:34.755ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6122023-01-20T02:09:34.757ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6132023-01-20T02:09:34.757ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6142023-01-20T02:09:34.757ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6152023-01-20T02:09:34.760ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6162023-01-20T02:09:34.760ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6172023-01-20T02:09:34.760ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6182023-01-20T02:09:34.761ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6192023-01-20T02:09:34.770ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6202023-01-20T02:09:34.771ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6212023-01-20T02:09:34.772ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6222023-01-20T02:09:34.773ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6232023-01-20T02:09:34.777ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6242023-01-20T02:09:34.778ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6252023-01-20T02:09:34.780ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6262023-01-20T02:09:34.781ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6272023-01-20T02:09:34.785ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6282023-01-20T02:09:34.809ZDEBGtest_instance_metrics (nexus): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") }, key: 7b2aabe7-b73d-4b1d-ae26-aa198623b619, lookup_type: ById(7b2aabe7-b73d-4b1d-ae26-aa198623b619) } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6292023-01-20T02:09:34.809ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6302023-01-20T02:09:34.810ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6312023-01-20T02:09:34.811ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateRoute
6322023-01-20T02:09:34.934ZDEBGtest_instance_metrics (SEC): saga log event new_state = N009 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
6332023-01-20T02:09:34.935ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6342023-01-20T02:09:34.946ZDEBGtest_instance_metrics (SEC): saga log event new_state = N010 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
6352023-01-20T02:09:34.946ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 10 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6362023-01-20T02:09:34.954ZTRACtest_instance_metrics (nexus): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6372023-01-20T02:09:34.955ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6382023-01-20T02:09:34.955ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6392023-01-20T02:09:34.956ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6402023-01-20T02:09:34.963ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6412023-01-20T02:09:34.963ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6422023-01-20T02:09:34.963ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6432023-01-20T02:09:34.963ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6442023-01-20T02:09:34.965ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6452023-01-20T02:09:34.968ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6462023-01-20T02:09:34.968ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6472023-01-20T02:09:34.969ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6482023-01-20T02:09:34.970ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6492023-01-20T02:09:34.975ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6502023-01-20T02:09:34.976ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6512023-01-20T02:09:34.976ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6522023-01-20T02:09:34.978ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6532023-01-20T02:09:34.986ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6542023-01-20T02:09:35.003ZDEBGtest_instance_metrics (nexus): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcCreateSubnet
6552023-01-20T02:09:35.101ZDEBGtest_instance_metrics (SEC): saga log event new_state = N010 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
6562023-01-20T02:09:35.101ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("21aa1a83-746e-4ae4-99b0-36d55ba64719"), "lookup_type": Object {"ById": String("21aa1a83-746e-4ae4-99b0-36d55ba64719")}, "parent": Object {"key": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("3066e033-1381-46c8-a1d1-5e4cfc458d7c"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("abfd948c-1b18-4d39-adfa-87a5027575eb"), "lookup_type": Object {"ByName": String("test-org")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, Object {"identity": Object {"description": String("The default subnet for default"), "id": String("21aa1a83-746e-4ae4-99b0-36d55ba64719"), "name": String("default"), "time_created": String("2023-01-20T02:09:34.954769Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:34.954769Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd94:b5a2:aca5::/64"), "rcgen": Number(0), "vpc_id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")}]) node_id = 10 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6572023-01-20T02:09:35.117ZDEBGtest_instance_metrics (SEC): saga log event new_state = N011 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
6582023-01-20T02:09:35.117ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 11 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6592023-01-20T02:09:35.125ZDEBGtest_instance_metrics (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: bc7fdf0a-e6e6-429e-bf18-4754c78cc816, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2023-01-20T02:09:35.124640095Z, time_modified: 2023-01-20T02:09:35.124640095Z, time_deleted: None }, vpc_id: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: bc12fa84-5e2f-4290-b728-d1508f37bcf3, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2023-01-20T02:09:35.124667872Z, time_modified: 2023-01-20T02:09:35.124667872Z, time_deleted: None }, vpc_id: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 561350d1-c336-4352-a7d0-c636f4802de8, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2023-01-20T02:09:35.124684471Z, time_modified: 2023-01-20T02:09:35.124684471Z, time_deleted: None }, vpc_id: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 60436195-1e7a-4388-b164-8a25b225011d, name: Name(Name("allow-rdp")), description: "allow inbound TCP connections on port 3389 from anywhere", time_created: 2023-01-20T02:09:35.124694583Z, time_modified: 2023-01-20T02:09:35.124694583Z, time_deleted: None }, vpc_id: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(3389), last: L4Port(3389) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
6602023-01-20T02:09:35.125ZTRACtest_instance_metrics (nexus): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6612023-01-20T02:09:35.126ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6622023-01-20T02:09:35.126ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6632023-01-20T02:09:35.127ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6642023-01-20T02:09:35.128ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6652023-01-20T02:09:35.132ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6662023-01-20T02:09:35.132ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6672023-01-20T02:09:35.132ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6682023-01-20T02:09:35.133ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6692023-01-20T02:09:35.137ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6702023-01-20T02:09:35.137ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6712023-01-20T02:09:35.137ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6722023-01-20T02:09:35.138ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6732023-01-20T02:09:35.142ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6742023-01-20T02:09:35.143ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6752023-01-20T02:09:35.143ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6762023-01-20T02:09:35.144ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6772023-01-20T02:09:35.148ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6782023-01-20T02:09:35.162ZDEBGtest_instance_metrics (nexus): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ByName("test-org") }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ByName("springfield-squidport") }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6792023-01-20T02:09:35.162ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6802023-01-20T02:09:35.163ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6812023-01-20T02:09:35.164ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcUpdateFirewall
6822023-01-20T02:09:35.447ZDEBGtest_instance_metrics (SEC): saga log event new_state = N011 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
6832023-01-20T02:09:35.447ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("bc7fdf0a-e6e6-429e-bf18-4754c78cc816"), "name": String("allow-internal-inbound"), "time_created": String("2023-01-20T02:09:35.124640095Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:35.124640095Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("bc12fa84-5e2f-4290-b728-d1508f37bcf3"), "name": String("allow-ssh"), "time_created": String("2023-01-20T02:09:35.124667872Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:35.124667872Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("561350d1-c336-4352-a7d0-c636f4802de8"), "name": String("allow-icmp"), "time_created": String("2023-01-20T02:09:35.124684471Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:35.124684471Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("3389")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 3389 from anywhere"), "id": String("60436195-1e7a-4388-b164-8a25b225011d"), "name": String("allow-rdp"), "time_created": String("2023-01-20T02:09:35.124694583Z"), "time_deleted": Null, "time_modified": String("2023-01-20T02:09:35.124694583Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("1cfd0fa5-b787-4f69-8bb1-a5a2420eed91")}]) node_id = 11 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6842023-01-20T02:09:35.455ZDEBGtest_instance_metrics (SEC): saga log event new_state = N012 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
6852023-01-20T02:09:35.455ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 12 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
6862023-01-20T02:09:35.466ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6872023-01-20T02:09:35.466ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6882023-01-20T02:09:35.467ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6892023-01-20T02:09:35.470ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6902023-01-20T02:09:35.471ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6912023-01-20T02:09:35.471ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6922023-01-20T02:09:35.475ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6932023-01-20T02:09:35.475ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6942023-01-20T02:09:35.476ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6952023-01-20T02:09:35.478ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6962023-01-20T02:09:35.479ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6972023-01-20T02:09:35.481ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6982023-01-20T02:09:35.484ZTRACtest_instance_metrics (nexus): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ById(abfd948c-1b18-4d39-adfa-87a5027575eb) }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ById(3066e033-1381-46c8-a1d1-5e4cfc458d7c) }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
6992023-01-20T02:09:35.488ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7002023-01-20T02:09:35.488ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7012023-01-20T02:09:35.488ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7022023-01-20T02:09:35.488ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7032023-01-20T02:09:35.491ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7042023-01-20T02:09:35.491ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7052023-01-20T02:09:35.492ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7062023-01-20T02:09:35.493ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7072023-01-20T02:09:35.498ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7082023-01-20T02:09:35.498ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7092023-01-20T02:09:35.499ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7102023-01-20T02:09:35.500ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7112023-01-20T02:09:35.505ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7122023-01-20T02:09:35.505ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7132023-01-20T02:09:35.505ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7142023-01-20T02:09:35.508ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7152023-01-20T02:09:35.514ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7162023-01-20T02:09:35.532ZDEBGtest_instance_metrics (nexus): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ById(abfd948c-1b18-4d39-adfa-87a5027575eb) }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ById(3066e033-1381-46c8-a1d1-5e4cfc458d7c) }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7172023-01-20T02:09:35.533ZTRACtest_instance_metrics (nexus): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ById(abfd948c-1b18-4d39-adfa-87a5027575eb) }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ById(3066e033-1381-46c8-a1d1-5e4cfc458d7c) }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7182023-01-20T02:09:35.534ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 3066e033-1381-46c8-a1d1-5e4cfc458d7c resource_type = Project saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7192023-01-20T02:09:35.534ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7202023-01-20T02:09:35.534ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7212023-01-20T02:09:35.534ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7222023-01-20T02:09:35.538ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = abfd948c-1b18-4d39-adfa-87a5027575eb resource_type = Organization saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7232023-01-20T02:09:35.539ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7242023-01-20T02:09:35.539ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7252023-01-20T02:09:35.540ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7262023-01-20T02:09:35.544ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7272023-01-20T02:09:35.544ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7282023-01-20T02:09:35.545ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7292023-01-20T02:09:35.546ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7302023-01-20T02:09:35.550ZTRACtest_instance_metrics (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7312023-01-20T02:09:35.550ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7322023-01-20T02:09:35.551ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7332023-01-20T02:09:35.552ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7342023-01-20T02:09:35.560ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7352023-01-20T02:09:35.575ZDEBGtest_instance_metrics (nexus): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Organization { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: abfd948c-1b18-4d39-adfa-87a5027575eb, lookup_type: ById(abfd948c-1b18-4d39-adfa-87a5027575eb) }, key: 3066e033-1381-46c8-a1d1-5e4cfc458d7c, lookup_type: ById(3066e033-1381-46c8-a1d1-5e4cfc458d7c) }, key: 1cfd0fa5-b787-4f69-8bb1-a5a2420eed91, lookup_type: ByName("default") } result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7362023-01-20T02:09:35.575ZTRACtest_instance_metrics (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7372023-01-20T02:09:35.575ZDEBGtest_instance_metrics (nexus): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7382023-01-20T02:09:35.576ZDEBGtest_instance_metrics (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create saga_node = VpcNotifySleds
7392023-01-20T02:09:35.583ZDEBGtest_instance_metrics (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
7402023-01-20T02:09:35.583ZDEBGtest_instance_metrics (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7412023-01-20T02:09:35.585ZDEBGtest_instance_metrics (clickhouse-client): new timeseries schema: "{\"timeseries_name\":\"integration_target:integration_metric\",\"fields.name\":[\"name\",\"name\"],\"fields.type\":[\"String\",\"String\"],\"fields.source\":[\"Target\",\"Metric\"],\"datum_type\":\"I64\",\"created\":\"2023-01-20 02:09:35.583586907\"}" collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7422023-01-20T02:09:35.585ZDEBGtest_instance_metrics (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7432023-01-20T02:09:35.585ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.timeseries_schema FORMAT JSONEachRow {"timeseries_name":"integration_target:integration_metric","fields.name":["name","name"],"fields.type":["String","String"],"fields.source":["Target","Metric"],"datum_type":"I64","created":"2023-01-20 02:09:35.583586907"} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7442023-01-20T02:09:35.607ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.fields_string FORMAT JSONEachRow {"timeseries_name":"integration_target:integration_metric","timeseries_key":6257040532384654857,"field_name":"name","field_value":"integration-test-target"} {"timeseries_name":"integration_target:integration_metric","timeseries_key":6257040532384654857,"field_name":"name","field_value":"integration-test-metric"} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7452023-01-20T02:09:35.615ZDEBGtest_instance_metrics (clickhouse-client): inserted 2 rows into table oximeter.fields_string collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7462023-01-20T02:09:35.615ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow {"timeseries_name":"integration_target:integration_metric","timeseries_key":6257040532384654857,"timestamp":"2023-01-20 02:09:34.722036013","datum":0} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7472023-01-20T02:09:35.627ZDEBGtest_instance_metrics (clickhouse-client): inserted 1 rows into table oximeter.measurements_i64 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
7482023-01-20T02:09:35.628ZTRACtest_instance_metrics (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
7492023-01-20T02:09:35.628ZDEBGtest_instance_metrics (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
7502023-01-20T02:09:35.628ZDEBGtest_instance_metrics (nexus): resolved firewall rules for sled agents sled_agent_rules = []
7512023-01-20T02:09:35.628ZDEBGtest_instance_metrics (nexus): resolved 0 rules for sleds
7522023-01-20T02:09:35.645ZDEBGtest_instance_metrics (nexus): resolved sleds for vpc default vpc_to_sled = []
7532023-01-20T02:09:35.645ZDEBGtest_instance_metrics (nexus): sending firewall rules to sled agents
7542023-01-20T02:09:35.645ZINFOtest_instance_metrics (nexus): updated firewall rules on 0 sleds
7552023-01-20T02:09:35.646ZDEBGtest_instance_metrics (SEC): saga log event new_state = N012 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
7562023-01-20T02:09:35.646ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7572023-01-20T02:09:35.651ZDEBGtest_instance_metrics (SEC): saga log event new_state = N013 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
7582023-01-20T02:09:35.652ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 13 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7592023-01-20T02:09:35.657ZDEBGtest_instance_metrics (SEC): saga log event new_state = N013 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
7602023-01-20T02:09:35.657ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7612023-01-20T02:09:35.662ZDEBGtest_instance_metrics (SEC): saga log event new_state = N015 started sec_id = 0532410e-45bd-48ac-9036-db9177388def
7622023-01-20T02:09:35.662ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Started node_id = 15 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7632023-01-20T02:09:35.672ZDEBGtest_instance_metrics (SEC): saga log event new_state = N015 succeeded sec_id = 0532410e-45bd-48ac-9036-db9177388def
7642023-01-20T02:09:35.672ZDEBGtest_instance_metrics (SecStore): recording saga event event_type = Succeeded(Null) node_id = 15 saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7652023-01-20T02:09:35.677ZINFOtest_instance_metrics (SEC): update for saga cached state new_state = Done saga_id = a07f4061-ec20-4115-ab11-ea440327935e sec_id = 0532410e-45bd-48ac-9036-db9177388def
7662023-01-20T02:09:35.677ZINFOtest_instance_metrics (SecStore): updating state new_state = done saga_id = a07f4061-ec20-4115-ab11-ea440327935e
7672023-01-20T02:09:35.721ZINFOtest_instance_metrics (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
7682023-01-20T02:09:35.722ZDEBGtest_instance_metrics (collection-task): collected 1 total results collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
7692023-01-20T02:09:35.747ZINFOtest_instance_metrics (SEC): saga finished saga_id = a07f4061-ec20-4115-ab11-ea440327935e saga_name = project-create sec_id = 0532410e-45bd-48ac-9036-db9177388def
7702023-01-20T02:09:35.748ZINFOtest_instance_metrics (dropshot_external): request completed local_addr = 127.0.0.1:32979 method = POST remote_addr = 127.0.0.1:41114 req_id = 7d7a0a5c-5a05-4e12-bcd8-d417b54b5d07 response_code = 201 uri = /v1/projects?organization=test-org
7712023-01-20T02:09:35.748ZINFOtest_instance_metrics (external client test context): client received response status = 201
7722023-01-20T02:09:35.749ZINFOtest_instance_metrics: registering Oso class class = Action
7732023-01-20T02:09:35.749ZINFOtest_instance_metrics: registering Oso class class = AnyActor
7742023-01-20T02:09:35.749ZINFOtest_instance_metrics: registering Oso class class = AuthenticatedActor
7752023-01-20T02:09:35.750ZINFOtest_instance_metrics: registering Oso class class = Database
7762023-01-20T02:09:35.750ZINFOtest_instance_metrics: registering Oso class class = Fleet
7772023-01-20T02:09:35.750ZINFOtest_instance_metrics: registering Oso class class = IpPoolList
7782023-01-20T02:09:35.750ZINFOtest_instance_metrics: registering Oso class class = GlobalImageList
7792023-01-20T02:09:35.751ZINFOtest_instance_metrics: registering Oso class class = ConsoleSessionList
7802023-01-20T02:09:35.751ZINFOtest_instance_metrics: registering Oso class class = DeviceAuthRequestList
7812023-01-20T02:09:35.751ZINFOtest_instance_metrics: registering Oso class class = SiloIdentityProviderList
7822023-01-20T02:09:35.752ZINFOtest_instance_metrics: registering Oso class class = SiloUserList
7832023-01-20T02:09:35.752ZINFOtest_instance_metrics: registering Oso class class = Organization
7842023-01-20T02:09:35.752ZINFOtest_instance_metrics: registering Oso class class = Project
7852023-01-20T02:09:35.753ZINFOtest_instance_metrics: registering Oso class class = Disk
7862023-01-20T02:09:35.754ZINFOtest_instance_metrics: registering Oso class class = Snapshot
7872023-01-20T02:09:35.755ZINFOtest_instance_metrics: registering Oso class class = Instance
7882023-01-20T02:09:35.755ZINFOtest_instance_metrics: registering Oso class class = IpPool
7892023-01-20T02:09:35.755ZINFOtest_instance_metrics: registering Oso class class = NetworkInterface
7902023-01-20T02:09:35.755ZINFOtest_instance_metrics: registering Oso class class = Vpc
7912023-01-20T02:09:35.756ZINFOtest_instance_metrics: registering Oso class class = VpcRouter
7922023-01-20T02:09:35.756ZINFOtest_instance_metrics: registering Oso class class = RouterRoute
7932023-01-20T02:09:35.757ZINFOtest_instance_metrics: registering Oso class class = VpcSubnet
7942023-01-20T02:09:35.757ZINFOtest_instance_metrics: registering Oso class class = ConsoleSession
7952023-01-20T02:09:35.757ZINFOtest_instance_metrics: registering Oso class class = DeviceAuthRequest
7962023-01-20T02:09:35.758ZINFOtest_instance_metrics: registering Oso class class = DeviceAccessToken
7972023-01-20T02:09:35.758ZINFOtest_instance_metrics: registering Oso class class = Rack
7982023-01-20T02:09:35.758ZINFOtest_instance_metrics: registering Oso class class = RoleBuiltin
7992023-01-20T02:09:35.758ZINFOtest_instance_metrics: registering Oso class class = SshKey
8002023-01-20T02:09:35.759ZINFOtest_instance_metrics: registering Oso class class = Silo
8012023-01-20T02:09:35.759ZINFOtest_instance_metrics: registering Oso class class = SiloUser
8022023-01-20T02:09:35.759ZINFOtest_instance_metrics: registering Oso class class = SiloGroup
8032023-01-20T02:09:35.759ZINFOtest_instance_metrics: registering Oso class class = IdentityProvider
8042023-01-20T02:09:35.759ZINFOtest_instance_metrics: registering Oso class class = SamlIdentityProvider
8052023-01-20T02:09:35.760ZINFOtest_instance_metrics: registering Oso class class = Sled
8062023-01-20T02:09:35.760ZINFOtest_instance_metrics: registering Oso class class = UpdateAvailableArtifact
8072023-01-20T02:09:35.761ZINFOtest_instance_metrics: registering Oso class class = UserBuiltin
8082023-01-20T02:09:35.763ZINFOtest_instance_metrics: registering Oso class class = GlobalImage
8092023-01-20T02:09:35.765ZINFOtest_instance_metrics: full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/ORGANIZATION/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Organization {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", organization: Organization)\n\tif organization.silo = silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Organization)\n\trelations = { parent_organization: Organization };\n\t"admin" if "collaborator" on "parent_organization";\n\t"viewer" if "viewer" on "parent_organization";\n}\nhas_relation(organization: Organization, "parent_organization", project: Project)\n\tif project.organization = organization;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/ORGANIZATION/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/system/images") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for accessing "/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/system/images" (in the API)\nresource GlobalImageList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the global images list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list global images.\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", global_image_list: GlobalImageList)\n\tif global_image_list.fleet = fleet;\n\n# Any authenticated user can list and read global images\nhas_permission(_actor: AuthenticatedActor, "list_children", _global_image_list: GlobalImageList);\nhas_permission(_actor: AuthenticatedActor, "read", _global_image: GlobalImage);\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource NetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: NetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: NetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource UpdateAvailableArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UpdateAvailableArtifact)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n resource GlobalImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: GlobalImage)\n if child.fleet = fleet;\n
8102023-01-20T02:09:35.780ZTRACtest_instance_metrics: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
8112023-01-20T02:09:35.781ZDEBGtest_instance_metrics: roles roles = RoleSet { roles: {} }
8122023-01-20T02:09:35.781ZDEBGtest_instance_metrics: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
8132023-01-20T02:09:35.782ZINFOtest_instance_metrics (external client test context): client request body = Body(Empty) method = GET uri = http://127.0.0.1:32979/system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8142023-01-20T02:09:35.782ZDEBGtest_instance_metrics (collection-task): collection task received explicit request to collect collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 0532410e-45bd-48ac-9036-db9177388def
8152023-01-20T02:09:35.782ZINFOtest_instance_metrics (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 0532410e-45bd-48ac-9036-db9177388def
8162023-01-20T02:09:35.783ZDEBGtest_instance_metrics (collection-task): collection task received explicit request to collect collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
8172023-01-20T02:09:35.784ZINFOtest_instance_metrics (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
8182023-01-20T02:09:35.784ZTRACtest_instance_metrics (dropshot_external): incoming request local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8192023-01-20T02:09:35.784ZTRACtest_instance_metrics (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8202023-01-20T02:09:35.785ZDEBGtest_instance_metrics (dropshot_external): looking up silo for user local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8212023-01-20T02:09:35.785ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
8222023-01-20T02:09:35.786ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
8232023-01-20T02:09:35.786ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
8242023-01-20T02:09:35.787ZINFOtest_instance_metrics (dropshot_internal): accepted connection local_addr = 127.0.0.1:39385 remote_addr = 127.0.0.1:60854
8252023-01-20T02:09:35.787ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
8262023-01-20T02:09:35.787ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
8272023-01-20T02:09:35.787ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
8282023-01-20T02:09:35.787ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
8292023-01-20T02:09:35.787ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
8302023-01-20T02:09:35.789ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
8312023-01-20T02:09:35.789ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
8322023-01-20T02:09:35.789ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
8332023-01-20T02:09:35.789ZTRACtest_instance_metrics (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8342023-01-20T02:09:35.789ZTRACtest_instance_metrics (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
8352023-01-20T02:09:35.789ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {} }
8362023-01-20T02:09:35.789ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
8372023-01-20T02:09:35.792ZDEBGtest_instance_metrics (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
8382023-01-20T02:09:35.798ZDEBGtest_instance_metrics (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
8392023-01-20T02:09:35.799ZTRACtest_instance_metrics (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8402023-01-20T02:09:35.799ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d resource = Fleet uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8412023-01-20T02:09:35.799ZTRACtest_instance_metrics (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8422023-01-20T02:09:35.800ZTRACtest_instance_metrics (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d resource = Database uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8432023-01-20T02:09:35.800ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d roles = RoleSet { roles: {} } uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8442023-01-20T02:09:35.801ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d resource = Database result = Ok(()) uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8452023-01-20T02:09:35.803ZTRACtest_instance_metrics (dropshot_internal): incoming request local_addr = 127.0.0.1:39385 method = GET remote_addr = 127.0.0.1:60854 req_id = 491cec10-6b04-428a-935f-d255b58c668f uri = /metrics/collect/0532410e-45bd-48ac-9036-db9177388def
8462023-01-20T02:09:35.813ZINFOtest_instance_metrics (dropshot_internal): request completed local_addr = 127.0.0.1:39385 method = GET remote_addr = 127.0.0.1:60854 req_id = 491cec10-6b04-428a-935f-d255b58c668f response_code = 200 uri = /metrics/collect/0532410e-45bd-48ac-9036-db9177388def
8472023-01-20T02:09:35.816ZDEBGtest_instance_metrics (collection-task): collected 1 total results collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
8482023-01-20T02:09:35.827ZDEBGtest_instance_metrics (collection-task): collected 3 total results collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 0532410e-45bd-48ac-9036-db9177388def
8492023-01-20T02:09:35.827ZDEBGtest_instance_metrics (results-sink): inserting 20 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
8502023-01-20T02:09:35.827ZDEBGtest_instance_metrics (clickhouse-client): unrolling 20 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8512023-01-20T02:09:35.832ZDEBGtest_instance_metrics (clickhouse-client): new timeseries schema: "{\"timeseries_name\":\"http_service:request_latency_histogram\",\"fields.name\":[\"name\",\"id\",\"route\",\"method\",\"status_code\"],\"fields.type\":[\"String\",\"Uuid\",\"String\",\"String\",\"I64\"],\"fields.source\":[\"Target\",\"Target\",\"Metric\",\"Metric\",\"Metric\"],\"datum_type\":\"HistogramF64\",\"created\":\"2023-01-20 02:09:35.830645051\"}" collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8522023-01-20T02:09:35.841ZDEBGtest_instance_metrics (clickhouse-client): new timeseries schema: "{\"timeseries_name\":\"collection_target:cpus_provisioned\",\"fields.name\":[\"id\"],\"fields.type\":[\"Uuid\"],\"fields.source\":[\"Target\"],\"datum_type\":\"I64\",\"created\":\"2023-01-20 02:09:35.840567052\"}" collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8532023-01-20T02:09:35.843ZDEBGtest_instance_metrics (clickhouse-client): new timeseries schema: "{\"timeseries_name\":\"collection_target:ram_provisioned\",\"fields.name\":[\"id\"],\"fields.type\":[\"Uuid\"],\"fields.source\":[\"Target\"],\"datum_type\":\"I64\",\"created\":\"2023-01-20 02:09:35.842104496\"}" collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8542023-01-20T02:09:35.844ZDEBGtest_instance_metrics (clickhouse-client): new timeseries schema: "{\"timeseries_name\":\"collection_target:virtual_disk_space_provisioned\",\"fields.name\":[\"id\"],\"fields.type\":[\"Uuid\"],\"fields.source\":[\"Target\"],\"datum_type\":\"I64\",\"created\":\"2023-01-20 02:09:35.843684644\"}" collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8552023-01-20T02:09:35.856ZDEBGtest_instance_metrics (clickhouse-client): inserting 4 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8562023-01-20T02:09:35.858ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.timeseries_schema FORMAT JSONEachRow {"timeseries_name":"http_service:request_latency_histogram","fields.name":["name","id","route","method","status_code"],"fields.type":["String","Uuid","String","String","I64"],"fields.source":["Target","Target","Metric","Metric","Metric"],"datum_type":"HistogramF64","created":"2023-01-20 02:09:35.830645051"} {"timeseries_name":"collection_target:cpus_provisioned","fields.name":["id"],"fields.type":["Uuid"],"fields.source":["Target"],"datum_type":"I64","created":"2023-01-20 02:09:35.840567052"} {"timeseries_name":"collection_target:ram_provisioned","fields.name":["id"],"fields.type":["Uuid"],"fields.source":["Target"],"datum_type":"I64","created":"2023-01-20 02:09:35.842104496"} {"timeseries_name":"collection_target:virtual_disk_space_provisioned","fields.name":["id"],"fields.type":["Uuid"],"fields.source":["Target"],"datum_type":"I64","created":"2023-01-20 02:09:35.843684644"} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8572023-01-20T02:09:35.860ZDEBGtest_instance_metrics (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8582023-01-20T02:09:35.875ZDEBGtest_instance_metrics (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d resource = Fleet result = Ok(()) uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8592023-01-20T02:09:35.906ZDEBGtest_instance_metrics (clickhouse-client): retrieving timeseries schema from database id = 50fb7335-8b55-406e-9300-52e34bb1395d
8602023-01-20T02:09:35.909ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: SELECT * FROM oximeter.timeseries_schema FORMAT JSONEachRow; id = 50fb7335-8b55-406e-9300-52e34bb1395d
8612023-01-20T02:09:35.910ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.fields_i64 FORMAT JSONEachRow {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"field_name":"status_code","field_value":204} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"field_name":"status_code","field_value":204} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"field_name":"status_code","field_value":204} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"field_name":"status_code","field_value":201} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"field_name":"status_code","field_value":201} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"field_name":"status_code","field_value":201} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8622023-01-20T02:09:35.918ZDEBGtest_instance_metrics (clickhouse-client): inserted 6 rows into table oximeter.fields_i64 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8632023-01-20T02:09:35.918ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.fields_string FORMAT JSONEachRow {"timeseries_name":"integration_target:integration_metric","timeseries_key":6257040532384654857,"field_name":"name","field_value":"integration-test-target"} {"timeseries_name":"integration_target:integration_metric","timeseries_key":6257040532384654857,"field_name":"name","field_value":"integration-test-metric"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"field_name":"name","field_value":"nexus-internal"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"field_name":"route","field_value":"/metrics/collectors"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"field_name":"method","field_value":"POST"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"field_name":"name","field_value":"nexus-internal"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"field_name":"route","field_value":"/metrics/producers"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"field_name":"method","field_value":"POST"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"field_name":"name","field_value":"nexus-internal"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"field_name":"route","field_value":"/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"field_name":"method","field_value":"POST"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"field_name":"name","field_value":"nexus-external"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"field_name":"route","field_value":"/system/ip-pools/default/ranges/add"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"field_name":"method","field_value":"POST"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"field_name":"name","field_value":"nexus-external"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"field_name":"route","field_value":"/v1/organizations"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"field_name":"method","field_value":"POST"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"field_name":"name","field_value":"nexus-external"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"field_name":"route","field_value":"/v1/projects"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"field_name":"method","field_value":"POST"} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8642023-01-20T02:09:35.946ZTRACtest_instance_metrics (clickhouse-client): extracting new timeseries schema id = 50fb7335-8b55-406e-9300-52e34bb1395d
8652023-01-20T02:09:35.950ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: SELECT filter0.timeseries_key as timeseries_key, filter0.field_name, filter0.field_value FROM (SELECT * FROM oximeter.fields_uuid WHERE timeseries_name = 'collection_target:virtual_disk_space_provisioned' AND field_name = 'id' AND field_value = 'abfd948c-1b18-4d39-adfa-87a5027575eb') AS filter0 ORDER BY (filter0.timeseries_name, filter0.timeseries_key) FORMAT JSONEachRow; id = 50fb7335-8b55-406e-9300-52e34bb1395d
8662023-01-20T02:09:35.958ZDEBGtest_instance_metrics (clickhouse-client): inserted 20 rows into table oximeter.fields_string collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8672023-01-20T02:09:35.958ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.fields_uuid FORMAT JSONEachRow {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"field_name":"id","field_value":"0532410e-45bd-48ac-9036-db9177388def"} {"timeseries_name":"collection_target:cpus_provisioned","timeseries_key":8221072622894359202,"field_name":"id","field_value":"001de000-5110-4000-8000-000000000000"} {"timeseries_name":"collection_target:ram_provisioned","timeseries_key":8221072622894359202,"field_name":"id","field_value":"001de000-5110-4000-8000-000000000000"} {"timeseries_name":"collection_target:virtual_disk_space_provisioned","timeseries_key":8221072622894359202,"field_name":"id","field_value":"001de000-5110-4000-8000-000000000000"} {"timeseries_name":"collection_target:cpus_provisioned","timeseries_key":5670937711533663662,"field_name":"id","field_value":"001de000-1334-4000-8000-000000000000"} {"timeseries_name":"collection_target:ram_provisioned","timeseries_key":5670937711533663662,"field_name":"id","field_value":"001de000-1334-4000-8000-000000000000"} {"timeseries_name":"collection_target:virtual_disk_space_provisioned","timeseries_key":5670937711533663662,"field_name":"id","field_value":"001de000-1334-4000-8000-000000000000"} {"timeseries_name":"collection_target:cpus_provisioned","timeseries_key":3237613196831629283,"field_name":"id","field_value":"abfd948c-1b18-4d39-adfa-87a5027575eb"} {"timeseries_name":"collection_target:ram_provisioned","timeseries_key":3237613196831629283,"field_name":"id","field_value":"abfd948c-1b18-4d39-adfa-87a5027575eb"} {"timeseries_name":"collection_target:virtual_disk_space_provisioned","timeseries_key":3237613196831629283,"field_name":"id","field_value":"abfd948c-1b18-4d39-adfa-87a5027575eb"} {"timeseries_name":"collection_target:cpus_provisioned","timeseries_key":10416330170716176492,"field_name":"id","field_value":"3066e033-1381-46c8-a1d1-5e4cfc458d7c"} {"timeseries_name":"collection_target:ram_provisioned","timeseries_key":10416330170716176492,"field_name":"id","field_value":"3066e033-1381-46c8-a1d1-5e4cfc458d7c"} {"timeseries_name":"collection_target:virtual_disk_space_provisioned","timeseries_key":10416330170716176492,"field_name":"id","field_value":"3066e033-1381-46c8-a1d1-5e4cfc458d7c"} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8682023-01-20T02:09:35.965ZDEBGtest_instance_metrics (clickhouse-client): inserted 18 rows into table oximeter.fields_uuid collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8692023-01-20T02:09:35.965ZTRACtest_instance_metrics (clickhouse-client): executing SQL query: INSERT INTO oximeter.measurements_histogramf64 FORMAT JSONEachRow {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":16178254823779457365,"start_time":"2023-01-20 02:09:32.174715551","timestamp":"2023-01-20 02:09:35.803481591","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":6283404916827430411,"start_time":"2023-01-20 02:09:32.174715551","timestamp":"2023-01-20 02:09:35.803527849","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":11965531461520446516,"start_time":"2023-01-20 02:09:32.174715551","timestamp":"2023-01-20 02:09:35.803542713","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17720351936774826564,"start_time":"2023-01-20 02:09:32.174769207","timestamp":"2023-01-20 02:09:35.803571340","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":17074482070470984986,"start_time":"2023-01-20 02:09:32.174769207","timestamp":"2023-01-20 02:09:35.803590023","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} {"timeseries_name":"http_service:request_latency_histogram","timeseries_key":4136654011909505012,"start_time":"2023-01-20 02:09:32.174769207","timestamp":"2023-01-20 02:09:35.803609730","bins":[-1.7976931348623157e308,0.0,1e-6,2e-6,3e-6,4e-6,5e-6,6e-6,7e-6,8e-6,9e-6,0.00001,0.00002,0.000030000000000000004,0.00004,0.00005,0.00006000000000000001,0.00007000000000000001,0.00008,0.00009,0.0001,0.0002,0.00030000000000000003,0.0004,0.0005,0.0006000000000000001,0.0007,0.0008,0.0009000000000000001,0.001,0.002,0.003,0.004,0.005,0.006,0.007,0.008,0.009000000000000001,0.01,0.02,0.03,0.04,0.05,0.06,0.07,0.08,0.09,0.1,0.2,0.30000000000000004,0.4,0.5,0.6000000000000001,0.7000000000000001,0.8,0.9,1.0,2.0,3.0,4.0,5.0,6.0,7.0,8.0,9.0,10.0,20.0,30.0,40.0,50.0,60.0,70.0,80.0,90.0,100.0,200.0,300.0,400.0,500.0,600.0,700.0,800.0,900.0],"counts":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0]} collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 id = 9dff7202-dbe9-4739-aee3-a7f2da1cb393
8702023-01-20T02:09:35.974ZINFOtest_instance_metrics (dropshot_external): request completed local_addr = 127.0.0.1:32979 method = GET remote_addr = 127.0.0.1:41114 req_id = 64c132d3-ada0-40b1-a1cc-1fef4892235d response_code = 200 uri = /system/metrics/virtual_disk_space_provisioned?start_time=2023-01-20T02:09:05.773298168Z&end_time=2023-01-20T02:10:05.773306411Z&id=abfd948c-1b18-4d39-adfa-87a5027575eb
8712023-01-20T02:09:35.977ZINFOtest_instance_metrics (external client test context): client received response status = 200