Max level shown:
12024-10-09T22:51:36.232ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_crdb
22024-10-09T22:51:36.233ZDEBGtest_snapshot_expunge: Starting CRDB
32024-10-09T22:51:36.263ZINFOtest_snapshot_expunge: cockroach temporary directory: /var/tmp/omicron_tmp/.tmp6JpsVl
42024-10-09T22:51:36.263ZINFOtest_snapshot_expunge: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar) to storage directory (/var/tmp/omicron_tmp/.tmp6JpsVl/data)
52024-10-09T22:51:36.282ZINFOtest_snapshot_expunge: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmp6JpsVl/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmp6JpsVl/listen-url
62024-10-09T22:51:36.283ZINFOtest_snapshot_expunge: cockroach environment: BUILDOMAT_JOB_ID=01J9SJYMATCRAF4F3QS7FBKSKS BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar GITHUB_BRANCH=clickhouse-inventory-collection GITHUB_REF=refs/heads/clickhouse-inventory-collection GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=632346210ca646c818d7aa831a111e033a94b92c GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib NEXTEST_RUN_ID=b2c3cc9f-c5f1-4193-a632-20d8708574c8 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-9dedaa07c0981ee9/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.80.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1 __NEXTEST_ORIGINAL_CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus
72024-10-09T22:51:37.679ZINFOtest_snapshot_expunge: cockroach pid: 19743
82024-10-09T22:51:37.680ZINFOtest_snapshot_expunge: cockroach listen URL: postgresql://root@[::1]:53251/omicron?sslmode=disable
92024-10-09T22:51:37.680ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_clickhouse
102024-10-09T22:51:37.680ZDEBGtest_snapshot_expunge: Starting Clickhouse
112024-10-09T22:51:38.318ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_gateway_switch0
122024-10-09T22:51:38.318ZDEBGtest_snapshot_expunge: Starting Management Gateway
132024-10-09T22:51:38.513ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_gateway_switch1
142024-10-09T22:51:38.513ZDEBGtest_snapshot_expunge: Starting Management Gateway
152024-10-09T22:51:38.669ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_dendrite_switch0
162024-10-09T22:51:38.669ZDEBGtest_snapshot_expunge: Starting Dendrite for switch0
172024-10-09T22:51:38.753ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_dendrite_switch1
182024-10-09T22:51:38.753ZDEBGtest_snapshot_expunge: Starting Dendrite for switch1
192024-10-09T22:51:38.828ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_mgd_switch0
202024-10-09T22:51:38.829ZDEBGtest_snapshot_expunge: Starting mgd for switch0
212024-10-09T22:51:39.005ZDEBGtest_snapshot_expunge: mgd port is 60030
222024-10-09T22:51:39.005ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_mgd_switch1
232024-10-09T22:51:39.005ZDEBGtest_snapshot_expunge: Starting mgd for switch1
242024-10-09T22:51:39.123ZDEBGtest_snapshot_expunge: mgd port is 41274
252024-10-09T22:51:39.123ZDEBGtest_snapshot_expunge (init_with_steps): Running step record_switch_dns
262024-10-09T22:51:39.123ZDEBGtest_snapshot_expunge: Recording DNS for the switch zones
272024-10-09T22:51:39.123ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_internal_dns
282024-10-09T22:51:39.123ZINFOtest_snapshot_expunge (store): opening sled database path = /var/tmp/omicron_tmp/.tmpYPkKDX
292024-10-09T22:51:39.259ZINFOtest_snapshot_expunge (store): pruning trees for generations newer than 0
302024-10-09T22:51:39.259ZINFOtest_snapshot_expunge (store): pruning trees for generations older than 0 keep = 3
312024-10-09T22:51:39.259ZINFOtest_snapshot_expunge (dns): DNS server bound to address kind = dns local_address = [::1]:35813
322024-10-09T22:51:39.262ZDEBGtest_snapshot_expunge (http): registered endpoint kind = dns local_addr = [::1]:55581 method = GET path = /config
332024-10-09T22:51:39.262ZDEBGtest_snapshot_expunge (http): registered endpoint kind = dns local_addr = [::1]:55581 method = PUT path = /config
342024-10-09T22:51:39.262ZINFOtest_snapshot_expunge (http): listening kind = dns local_addr = [::1]:55581
352024-10-09T22:51:39.263ZDEBGtest_snapshot_expunge (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:55581
362024-10-09T22:51:39.263ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_external_dns
372024-10-09T22:51:39.263ZINFOtest_snapshot_expunge (store): opening sled database path = /var/tmp/omicron_tmp/.tmpij1GLb
382024-10-09T22:51:39.281ZINFOtest_snapshot_expunge (store): pruning trees for generations newer than 0
392024-10-09T22:51:39.281ZINFOtest_snapshot_expunge (store): pruning trees for generations older than 0 keep = 3
402024-10-09T22:51:39.281ZINFOtest_snapshot_expunge (dns): DNS server bound to address kind = dns local_address = [::1]:63802
412024-10-09T22:51:39.282ZDEBGtest_snapshot_expunge (http): registered endpoint kind = dns local_addr = [::1]:45535 method = GET path = /config
422024-10-09T22:51:39.282ZDEBGtest_snapshot_expunge (http): registered endpoint kind = dns local_addr = [::1]:45535 method = PUT path = /config
432024-10-09T22:51:39.282ZINFOtest_snapshot_expunge (http): listening kind = dns local_addr = [::1]:45535
442024-10-09T22:51:39.282ZDEBGtest_snapshot_expunge (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:45535
452024-10-09T22:51:39.283ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_nexus_internal
462024-10-09T22:51:39.283ZDEBGtest_snapshot_expunge: Starting Nexus (internal API)
472024-10-09T22:51:39.303ZINFOtest_snapshot_expunge: setting up nexus server
482024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Action
492024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = AnyActor
502024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = AuthenticatedActor
512024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = BlueprintConfig
522024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Database
532024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = DnsConfig
542024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Fleet
552024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Inventory
562024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = IpPoolList
572024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = ConsoleSessionList
582024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = DeviceAuthRequestList
592024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloCertificateList
602024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloIdentityProviderList
612024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloUserList
622024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Project
632024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Disk
642024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Snapshot
652024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = ProjectImage
662024-10-09T22:51:39.306ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Instance
672024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = IpPool
682024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = InstanceNetworkInterface
692024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Vpc
702024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = VpcRouter
712024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = InternetGateway
722024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = InternetGatewayIpPool
732024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = InternetGatewayIpAddress
742024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = RouterRoute
752024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = VpcSubnet
762024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = FloatingIp
772024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Image
782024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloImage
792024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = AddressLot
802024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Blueprint
812024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = LoopbackAddress
822024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Certificate
832024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = ConsoleSession
842024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = DeviceAuthRequest
852024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = DeviceAccessToken
862024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = PhysicalDisk
872024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Rack
882024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = RoleBuiltin
892024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SshKey
902024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Silo
912024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloUser
922024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SiloGroup
932024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = IdentityProvider
942024-10-09T22:51:39.307ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = SamlIdentityProvider
952024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Sled
962024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = TufRepo
972024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = TufArtifact
982024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Zpool
992024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = Service
1002024-10-09T22:51:39.308ZINFOtest_snapshot_expunge (ServerContext): registering Oso class class = UserBuiltin
1012024-10-09T22:51:39.314ZINFOtest_snapshot_expunge (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
1022024-10-09T22:51:39.365ZINFOtest_snapshot_expunge (ServerContext): Setting up resolver using DNS address: [::1]:35813
1032024-10-09T22:51:39.365ZINFOtest_snapshot_expunge (DnsResolver): new DNS resolver addresses = [[::1]:35813]
1042024-10-09T22:51:39.365ZINFOtest_snapshot_expunge (ServerContext): Setting up qorb pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:53251/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 53251,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n },\n}
1052024-10-09T22:51:39.479ZINFOtest_snapshot_expunge (nexus): Database schema version is up to date desired_version = 109.0.0 found_version = 109.0.0
1062024-10-09T22:51:40.594ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /artifacts/{kind}/{name}/{version}
1072024-10-09T22:51:40.595ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /bgtasks
1082024-10-09T22:51:40.595ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /bgtasks/activate
1092024-10-09T22:51:40.595ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /bgtasks/view/{bgtask_name}
1102024-10-09T22:51:40.595ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
1112024-10-09T22:51:40.595ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
1122024-10-09T22:51:40.596ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
1132024-10-09T22:51:40.596ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish
1142024-10-09T22:51:40.596ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start
1152024-10-09T22:51:40.597ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /demo-saga
1162024-10-09T22:51:40.598ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /demo-saga/{demo_saga_id}/complete
1172024-10-09T22:51:40.598ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /deployment/blueprints/all
1182024-10-09T22:51:40.599ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = DELETE path = /deployment/blueprints/all/{blueprint_id}
1192024-10-09T22:51:40.599ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /deployment/blueprints/all/{blueprint_id}
1202024-10-09T22:51:40.599ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /deployment/blueprints/import
1212024-10-09T22:51:40.599ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /deployment/blueprints/regenerate
1222024-10-09T22:51:40.600ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /deployment/blueprints/target
1232024-10-09T22:51:40.600ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /deployment/blueprints/target
1242024-10-09T22:51:40.600ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = PUT path = /deployment/blueprints/target/enabled
1252024-10-09T22:51:40.600ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /disk/{disk_id}/remove-read-only-parent
1262024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = PUT path = /disks/{disk_id}
1272024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /instances/{instance_id}/migrate
1282024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /metrics/collectors
1292024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /metrics/collectors/{collector_id}/producers
1302024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /metrics/producers
1312024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /nat/ipv4/changeset/{from_gen}
1322024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /physical-disk/expunge
1332024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /probes/{sled}
1342024-10-09T22:51:40.610ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = PUT path = /racks/{rack_id}/initialization-complete
1352024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /sagas
1362024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /sagas/{saga_id}
1372024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /sled-agents/{sled_id}
1382024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /sled-agents/{sled_id}
1392024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /sled-agents/{sled_id}/firewall-rules-update
1402024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /sleds/add
1412024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /sleds/expunge
1422024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = GET path = /sleds/uninitialized
1432024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = PUT path = /switch/{switch_id}
1442024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = PUT path = /vmms/{propolis_id}
1452024-10-09T22:51:40.611ZDEBGtest_snapshot_expunge (dropshot_internal): registered endpoint local_addr = 127.0.0.1:46595 method = POST path = /volume/{volume_id}/remove-read-only-parent
1462024-10-09T22:51:40.611ZINFOtest_snapshot_expunge (dropshot_internal): listening local_addr = 127.0.0.1:46595
1472024-10-09T22:51:40.612ZDEBGtest_snapshot_expunge (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:46595
1482024-10-09T22:51:40.612ZINFOtest_snapshot_expunge (SEC): SEC running sec_id = f6fb5253-e555-4200-83a7-6591902f4bd5
1492024-10-09T22:51:40.612ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1502024-10-09T22:51:40.612ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1512024-10-09T22:51:40.616ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1522024-10-09T22:51:40.617ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in users
1532024-10-09T22:51:40.617ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1542024-10-09T22:51:40.618ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1552024-10-09T22:51:40.618ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1562024-10-09T22:51:40.647ZINFOtest_snapshot_expunge (DataLoader): created 5 built-in users
1572024-10-09T22:51:40.647ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1582024-10-09T22:51:40.648ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1592024-10-09T22:51:40.654ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1602024-10-09T22:51:40.655ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in roles
1612024-10-09T22:51:40.655ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1622024-10-09T22:51:40.655ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1632024-10-09T22:51:40.655ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1642024-10-09T22:51:40.693ZINFOtest_snapshot_expunge (DataLoader): created 10 built-in roles
1652024-10-09T22:51:40.693ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1662024-10-09T22:51:40.693ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1672024-10-09T22:51:40.704ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1682024-10-09T22:51:40.704ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in role assignments
1692024-10-09T22:51:40.704ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1702024-10-09T22:51:40.704ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1712024-10-09T22:51:40.706ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1722024-10-09T22:51:40.997ZINFOtest_snapshot_expunge (DataLoader): created 4 built-in role assignments
1732024-10-09T22:51:40.997ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1742024-10-09T22:51:40.997ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1752024-10-09T22:51:41.001ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1762024-10-09T22:51:41.001ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in silos
1772024-10-09T22:51:41.001ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1782024-10-09T22:51:41.001ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1792024-10-09T22:51:41.008ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1802024-10-09T22:51:41.085ZINFOtest_snapshot_expunge (DataLoader): created 2 built-in silos
1812024-10-09T22:51:41.085ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1822024-10-09T22:51:41.085ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1832024-10-09T22:51:41.085ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1842024-10-09T22:51:41.109ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1852024-10-09T22:51:41.109ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1862024-10-09T22:51:41.112ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1872024-10-09T22:51:41.112ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in projects
1882024-10-09T22:51:41.112ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1892024-10-09T22:51:41.112ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1902024-10-09T22:51:41.114ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1912024-10-09T22:51:41.118ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
1922024-10-09T22:51:41.118ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
1932024-10-09T22:51:41.118ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1942024-10-09T22:51:41.118ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1952024-10-09T22:51:41.119ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1962024-10-09T22:51:41.122ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1972024-10-09T22:51:41.122ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1982024-10-09T22:51:41.122ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
1992024-10-09T22:51:41.123ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2002024-10-09T22:51:41.177ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2012024-10-09T22:51:41.185ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2022024-10-09T22:51:41.185ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2032024-10-09T22:51:41.185ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2042024-10-09T22:51:41.186ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2052024-10-09T22:51:41.186ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2062024-10-09T22:51:41.191ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2072024-10-09T22:51:41.194ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2082024-10-09T22:51:41.194ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2092024-10-09T22:51:41.194ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2102024-10-09T22:51:41.195ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2112024-10-09T22:51:41.221ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2122024-10-09T22:51:41.229ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2132024-10-09T22:51:41.229ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2142024-10-09T22:51:41.229ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2152024-10-09T22:51:41.230ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2162024-10-09T22:51:41.262ZINFOtest_snapshot_expunge (DataLoader): created built-in services project
2172024-10-09T22:51:41.262ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2182024-10-09T22:51:41.263ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2192024-10-09T22:51:41.267ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2202024-10-09T22:51:41.267ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in VPCs
2212024-10-09T22:51:41.267ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2222024-10-09T22:51:41.267ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2232024-10-09T22:51:41.268ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2242024-10-09T22:51:41.271ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2252024-10-09T22:51:41.271ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2262024-10-09T22:51:41.272ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2272024-10-09T22:51:41.274ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2282024-10-09T22:51:41.274ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2292024-10-09T22:51:41.274ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2302024-10-09T22:51:41.274ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2312024-10-09T22:51:41.275ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2322024-10-09T22:51:41.276ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2332024-10-09T22:51:41.277ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2342024-10-09T22:51:41.277ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2352024-10-09T22:51:41.277ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2362024-10-09T22:51:41.278ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2372024-10-09T22:51:41.278ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2382024-10-09T22:51:41.279ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2392024-10-09T22:51:41.279ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2402024-10-09T22:51:41.280ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2412024-10-09T22:51:41.287ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2422024-10-09T22:51:41.287ZTRACtest_snapshot_expunge (DataLoader): successful lookup of siloed resource "Project" using built-in user
2432024-10-09T22:51:41.287ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2442024-10-09T22:51:41.287ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2452024-10-09T22:51:41.287ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2462024-10-09T22:51:41.287ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2472024-10-09T22:51:41.288ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2482024-10-09T22:51:41.289ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2492024-10-09T22:51:41.289ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2502024-10-09T22:51:41.289ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2512024-10-09T22:51:41.290ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2522024-10-09T22:51:41.291ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2532024-10-09T22:51:41.292ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2542024-10-09T22:51:41.292ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2552024-10-09T22:51:41.292ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2562024-10-09T22:51:41.293ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2572024-10-09T22:51:41.300ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2582024-10-09T22:51:41.300ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2592024-10-09T22:51:41.300ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2602024-10-09T22:51:41.301ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2612024-10-09T22:51:41.316ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2622024-10-09T22:51:41.316ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2632024-10-09T22:51:41.316ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2642024-10-09T22:51:41.316ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2652024-10-09T22:51:41.317ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2662024-10-09T22:51:41.319ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2672024-10-09T22:51:41.319ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2682024-10-09T22:51:41.319ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2692024-10-09T22:51:41.319ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2702024-10-09T22:51:41.321ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2712024-10-09T22:51:41.321ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2722024-10-09T22:51:41.321ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2732024-10-09T22:51:41.322ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2742024-10-09T22:51:41.323ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2752024-10-09T22:51:41.331ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2762024-10-09T22:51:41.331ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2772024-10-09T22:51:41.331ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2782024-10-09T22:51:41.332ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2792024-10-09T22:51:41.342ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2802024-10-09T22:51:41.342ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2812024-10-09T22:51:41.342ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2822024-10-09T22:51:41.352ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2832024-10-09T22:51:41.352ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2842024-10-09T22:51:41.352ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2852024-10-09T22:51:41.355ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2862024-10-09T22:51:41.355ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2872024-10-09T22:51:41.355ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2882024-10-09T22:51:41.355ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2892024-10-09T22:51:41.356ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2902024-10-09T22:51:41.357ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2912024-10-09T22:51:41.357ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2922024-10-09T22:51:41.357ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2932024-10-09T22:51:41.358ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2942024-10-09T22:51:41.359ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2952024-10-09T22:51:41.360ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2962024-10-09T22:51:41.360ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2972024-10-09T22:51:41.360ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2982024-10-09T22:51:41.362ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
2992024-10-09T22:51:41.369ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3002024-10-09T22:51:41.369ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3012024-10-09T22:51:41.369ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3022024-10-09T22:51:41.370ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3032024-10-09T22:51:41.418ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3042024-10-09T22:51:41.418ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3052024-10-09T22:51:41.418ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3062024-10-09T22:51:41.418ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3072024-10-09T22:51:41.419ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3082024-10-09T22:51:41.421ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3092024-10-09T22:51:41.421ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3102024-10-09T22:51:41.421ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3112024-10-09T22:51:41.422ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3122024-10-09T22:51:41.436ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3132024-10-09T22:51:41.436ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3142024-10-09T22:51:41.436ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3152024-10-09T22:51:41.437ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3162024-10-09T22:51:41.438ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3172024-10-09T22:51:41.457ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3182024-10-09T22:51:41.457ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3192024-10-09T22:51:41.457ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3202024-10-09T22:51:41.458ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3212024-10-09T22:51:41.558ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3222024-10-09T22:51:41.558ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3232024-10-09T22:51:41.558ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3242024-10-09T22:51:41.558ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3252024-10-09T22:51:41.559ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3262024-10-09T22:51:41.561ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3272024-10-09T22:51:41.561ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3282024-10-09T22:51:41.561ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3292024-10-09T22:51:41.562ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3302024-10-09T22:51:41.564ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3312024-10-09T22:51:41.564ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3322024-10-09T22:51:41.564ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3332024-10-09T22:51:41.565ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3342024-10-09T22:51:41.588ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3352024-10-09T22:51:41.596ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3362024-10-09T22:51:41.596ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3372024-10-09T22:51:41.596ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3382024-10-09T22:51:41.596ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3392024-10-09T22:51:41.615ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in VPC firewall rules
3402024-10-09T22:51:41.615ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3412024-10-09T22:51:41.615ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3422024-10-09T22:51:41.616ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3432024-10-09T22:51:41.620ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3442024-10-09T22:51:41.620ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3452024-10-09T22:51:41.621ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3462024-10-09T22:51:41.624ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3472024-10-09T22:51:41.624ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3482024-10-09T22:51:41.624ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3492024-10-09T22:51:41.627ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3502024-10-09T22:51:41.627ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3512024-10-09T22:51:41.627ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3522024-10-09T22:51:41.627ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3532024-10-09T22:51:41.627ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3542024-10-09T22:51:41.633ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3552024-10-09T22:51:41.633ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3562024-10-09T22:51:41.633ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3572024-10-09T22:51:41.634ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3582024-10-09T22:51:41.636ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3592024-10-09T22:51:41.636ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3602024-10-09T22:51:41.636ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3612024-10-09T22:51:41.637ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3622024-10-09T22:51:41.645ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3632024-10-09T22:51:41.658ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3642024-10-09T22:51:41.658ZTRACtest_snapshot_expunge (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
3652024-10-09T22:51:41.658ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3662024-10-09T22:51:41.659ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3672024-10-09T22:51:41.659ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3682024-10-09T22:51:41.659ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3692024-10-09T22:51:41.659ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3702024-10-09T22:51:41.662ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3712024-10-09T22:51:41.662ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3722024-10-09T22:51:41.663ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3732024-10-09T22:51:41.663ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3742024-10-09T22:51:41.672ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3752024-10-09T22:51:41.672ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3762024-10-09T22:51:41.672ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3772024-10-09T22:51:41.672ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3782024-10-09T22:51:41.679ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3792024-10-09T22:51:41.687ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3802024-10-09T22:51:41.687ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3812024-10-09T22:51:41.687ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3822024-10-09T22:51:41.688ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3832024-10-09T22:51:41.725ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3842024-10-09T22:51:41.725ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3852024-10-09T22:51:41.725ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3862024-10-09T22:51:41.725ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3872024-10-09T22:51:41.726ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3882024-10-09T22:51:41.728ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3892024-10-09T22:51:41.728ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3902024-10-09T22:51:41.728ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3912024-10-09T22:51:41.729ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3922024-10-09T22:51:41.748ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3932024-10-09T22:51:41.748ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3942024-10-09T22:51:41.748ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3952024-10-09T22:51:41.750ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3962024-10-09T22:51:41.753ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
3972024-10-09T22:51:41.762ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3982024-10-09T22:51:41.762ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3992024-10-09T22:51:41.762ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4002024-10-09T22:51:41.762ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4012024-10-09T22:51:41.880ZINFOtest_snapshot_expunge (DataLoader): created built-in VPC firewall rules
4022024-10-09T22:51:41.880ZDEBGtest_snapshot_expunge (DataLoader): attempting to create built-in VPC Subnets
4032024-10-09T22:51:41.880ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4042024-10-09T22:51:41.880ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4052024-10-09T22:51:41.883ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4062024-10-09T22:51:41.886ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4072024-10-09T22:51:41.886ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4082024-10-09T22:51:41.888ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4092024-10-09T22:51:41.890ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4102024-10-09T22:51:41.890ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4112024-10-09T22:51:41.891ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4122024-10-09T22:51:41.892ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4132024-10-09T22:51:41.892ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4142024-10-09T22:51:41.892ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4152024-10-09T22:51:41.892ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4162024-10-09T22:51:41.893ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4172024-10-09T22:51:41.916ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4182024-10-09T22:51:41.916ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4192024-10-09T22:51:41.916ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4202024-10-09T22:51:41.926ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4212024-10-09T22:51:41.929ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4222024-10-09T22:51:41.929ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4232024-10-09T22:51:41.929ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4242024-10-09T22:51:41.930ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4252024-10-09T22:51:41.934ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4262024-10-09T22:51:41.943ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4272024-10-09T22:51:41.943ZTRACtest_snapshot_expunge (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4282024-10-09T22:51:41.943ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4292024-10-09T22:51:41.943ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4302024-10-09T22:51:41.943ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4312024-10-09T22:51:41.992ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4322024-10-09T22:51:41.992ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4332024-10-09T22:51:41.992ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4342024-10-09T22:51:41.992ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4352024-10-09T22:51:41.993ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4362024-10-09T22:51:41.995ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4372024-10-09T22:51:41.995ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4382024-10-09T22:51:41.995ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4392024-10-09T22:51:41.995ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4402024-10-09T22:51:42.035ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4412024-10-09T22:51:42.035ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4422024-10-09T22:51:42.035ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4432024-10-09T22:51:42.036ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4442024-10-09T22:51:42.059ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4452024-10-09T22:51:42.071ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4462024-10-09T22:51:42.088ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4472024-10-09T22:51:42.088ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4482024-10-09T22:51:42.089ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4492024-10-09T22:51:42.221ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4502024-10-09T22:51:42.238ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4512024-10-09T22:51:42.240ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4522024-10-09T22:51:42.304ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4532024-10-09T22:51:42.304ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4542024-10-09T22:51:42.304ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4552024-10-09T22:51:42.304ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4562024-10-09T22:51:42.305ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4572024-10-09T22:51:42.375ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4582024-10-09T22:51:42.375ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4592024-10-09T22:51:42.375ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4602024-10-09T22:51:42.376ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4612024-10-09T22:51:42.378ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4622024-10-09T22:51:42.378ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4632024-10-09T22:51:42.378ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4642024-10-09T22:51:42.379ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4652024-10-09T22:51:42.380ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4662024-10-09T22:51:42.388ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4672024-10-09T22:51:42.388ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4682024-10-09T22:51:42.388ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4692024-10-09T22:51:42.389ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4702024-10-09T22:51:42.399ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4712024-10-09T22:51:42.399ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4722024-10-09T22:51:42.400ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4732024-10-09T22:51:42.402ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4742024-10-09T22:51:42.402ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4752024-10-09T22:51:42.402ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4762024-10-09T22:51:42.402ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4772024-10-09T22:51:42.403ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4782024-10-09T22:51:42.408ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4792024-10-09T22:51:42.408ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4802024-10-09T22:51:42.408ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4812024-10-09T22:51:42.409ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4822024-10-09T22:51:42.411ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4832024-10-09T22:51:42.411ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4842024-10-09T22:51:42.411ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4852024-10-09T22:51:42.412ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4862024-10-09T22:51:42.414ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4872024-10-09T22:51:42.422ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4882024-10-09T22:51:42.428ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4892024-10-09T22:51:42.428ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4902024-10-09T22:51:42.429ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4912024-10-09T22:51:42.444ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4922024-10-09T22:51:42.444ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4932024-10-09T22:51:42.445ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4942024-10-09T22:51:42.449ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4952024-10-09T22:51:42.449ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4962024-10-09T22:51:42.449ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4972024-10-09T22:51:42.449ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
4982024-10-09T22:51:42.450ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4992024-10-09T22:51:42.455ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5002024-10-09T22:51:42.455ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5012024-10-09T22:51:42.455ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5022024-10-09T22:51:42.456ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5032024-10-09T22:51:42.458ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5042024-10-09T22:51:42.458ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5052024-10-09T22:51:42.458ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5062024-10-09T22:51:42.459ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5072024-10-09T22:51:42.461ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5082024-10-09T22:51:42.469ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5092024-10-09T22:51:42.469ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5102024-10-09T22:51:42.469ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5112024-10-09T22:51:42.470ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5122024-10-09T22:51:42.481ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5132024-10-09T22:51:42.481ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5142024-10-09T22:51:42.483ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5152024-10-09T22:51:42.490ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5162024-10-09T22:51:42.490ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5172024-10-09T22:51:42.490ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5182024-10-09T22:51:42.491ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5192024-10-09T22:51:42.491ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5202024-10-09T22:51:42.498ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5212024-10-09T22:51:42.498ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5222024-10-09T22:51:42.498ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5232024-10-09T22:51:42.499ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5242024-10-09T22:51:42.508ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5252024-10-09T22:51:42.508ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5262024-10-09T22:51:42.508ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5272024-10-09T22:51:42.509ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5282024-10-09T22:51:42.522ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5292024-10-09T22:51:42.529ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5302024-10-09T22:51:42.537ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5312024-10-09T22:51:42.538ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5322024-10-09T22:51:42.538ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5332024-10-09T22:51:42.555ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5342024-10-09T22:51:42.555ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5352024-10-09T22:51:42.557ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5362024-10-09T22:51:42.563ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5372024-10-09T22:51:42.563ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5382024-10-09T22:51:42.563ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5392024-10-09T22:51:42.564ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5402024-10-09T22:51:42.564ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5412024-10-09T22:51:42.572ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5422024-10-09T22:51:42.572ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5432024-10-09T22:51:42.572ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5442024-10-09T22:51:42.573ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5452024-10-09T22:51:42.596ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5462024-10-09T22:51:42.596ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5472024-10-09T22:51:42.596ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5482024-10-09T22:51:42.597ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5492024-10-09T22:51:42.603ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5502024-10-09T22:51:42.626ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5512024-10-09T22:51:42.626ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5522024-10-09T22:51:42.626ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5532024-10-09T22:51:42.626ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5542024-10-09T22:51:42.645ZINFOtest_snapshot_expunge (DataLoader): created built-in services vpc subnets
5552024-10-09T22:51:42.645ZINFOtest_snapshot_expunge (DataLoader): created built-in services vpc
5562024-10-09T22:51:42.645ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5572024-10-09T22:51:42.645ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5582024-10-09T22:51:42.648ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5592024-10-09T22:51:42.648ZDEBGtest_snapshot_expunge (DataLoader): attempting to create silo users
5602024-10-09T22:51:42.648ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5612024-10-09T22:51:42.648ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5622024-10-09T22:51:42.649ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5632024-10-09T22:51:42.660ZINFOtest_snapshot_expunge (DataLoader): created 2 silo users
5642024-10-09T22:51:42.660ZDEBGtest_snapshot_expunge (DataLoader): attempting to create silo user role assignments
5652024-10-09T22:51:42.660ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5662024-10-09T22:51:42.660ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5672024-10-09T22:51:42.661ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5682024-10-09T22:51:42.685ZINFOtest_snapshot_expunge (DataLoader): created 2 silo user role assignments
5692024-10-09T22:51:42.685ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5702024-10-09T22:51:42.686ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5712024-10-09T22:51:42.686ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5722024-10-09T22:51:42.704ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5732024-10-09T22:51:42.704ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5742024-10-09T22:51:42.705ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5752024-10-09T22:51:42.717ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5762024-10-09T22:51:42.718ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5772024-10-09T22:51:42.718ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5782024-10-09T22:51:42.718ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5792024-10-09T22:51:42.719ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5802024-10-09T22:51:42.723ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5812024-10-09T22:51:42.731ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5822024-10-09T22:51:42.733ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5832024-10-09T22:51:42.733ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5842024-10-09T22:51:42.734ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5852024-10-09T22:51:42.755ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5862024-10-09T22:51:42.755ZTRACtest_snapshot_expunge (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5872024-10-09T22:51:42.755ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5882024-10-09T22:51:42.755ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5892024-10-09T22:51:42.756ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5902024-10-09T22:51:42.762ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5912024-10-09T22:51:42.769ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5922024-10-09T22:51:42.769ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5932024-10-09T22:51:42.769ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5942024-10-09T22:51:42.770ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5952024-10-09T22:51:42.892ZTRACtest_snapshot_expunge (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5962024-10-09T22:51:42.893ZDEBGtest_snapshot_expunge (DataLoader): roles roles = RoleSet { roles: {} }
5972024-10-09T22:51:42.893ZDEBGtest_snapshot_expunge (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5982024-10-09T22:51:42.902ZINFOtest_snapshot_expunge (nexus): populate complete
5992024-10-09T22:51:42.902ZINFOtest_snapshot_expunge (nexus): activating background tasks
6002024-10-09T22:51:42.905ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_sled1
6012024-10-09T22:51:42.905ZINFOtest_snapshot_expunge (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6022024-10-09T22:51:42.974ZINFOtest_snapshot_expunge (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6032024-10-09T22:51:42.980ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6042024-10-09T22:51:42.980ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6052024-10-09T22:51:42.980ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6062024-10-09T22:51:42.980ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6072024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /cockroachdb sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6082024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6092024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6102024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6112024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6122024-10-09T22:51:42.981ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6132024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6142024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6152024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6162024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6172024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6182024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6192024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6202024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6212024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6222024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6232024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6242024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /timesync sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6252024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /update sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6262024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6272024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6282024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6292024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6302024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6312024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6322024-10-09T22:51:42.982ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6332024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6342024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6352024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6362024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6372024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6382024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6392024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6402024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6412024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6422024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6432024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6442024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6452024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6462024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6472024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6482024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6492024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = POST path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6502024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6512024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6522024-10-09T22:51:42.983ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:59608 method = GET path = /zpools sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6532024-10-09T22:51:42.984ZINFOtest_snapshot_expunge (dropshot): listening local_addr = [::1]:59608 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6542024-10-09T22:51:42.984ZDEBGtest_snapshot_expunge (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:59608 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6552024-10-09T22:51:42.984ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6562024-10-09T22:51:42.984ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6572024-10-09T22:51:42.984ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
6582024-10-09T22:51:42.984ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6592024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6602024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6612024-10-09T22:51:42.985ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6622024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6632024-10-09T22:51:42.985ZWARNtest_snapshot_expunge (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6642024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 58.277\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6652024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6662024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6672024-10-09T22:51:42.985ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
6682024-10-09T22:51:42.985ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6692024-10-09T22:51:42.986ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6702024-10-09T22:51:42.986ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6712024-10-09T22:51:42.986ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6722024-10-09T22:51:42.987ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6732024-10-09T22:51:42.987ZWARNtest_snapshot_expunge (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6742024-10-09T22:51:42.987ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 75.857\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6752024-10-09T22:51:42.987ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
6762024-10-09T22:51:42.991ZINFOtest_snapshot_expunge (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2024-10-09 22:41:42.987283176 UTC
6772024-10-09T22:51:42.991ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
6782024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
6792024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6802024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6812024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:46595/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
6822024-10-09T22:51:42.991ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:37331
6832024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
6842024-10-09T22:51:42.991ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
6852024-10-09T22:51:42.991ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6862024-10-09T22:51:42.991ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
6872024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6882024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
6892024-10-09T22:51:42.991ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 1 reason = Timeout
6902024-10-09T22:51:42.991ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
6912024-10-09T22:51:42.992ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
6922024-10-09T22:51:42.993ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
6932024-10-09T22:51:42.994ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
6942024-10-09T22:51:42.994ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
6952024-10-09T22:51:42.994ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
6962024-10-09T22:51:42.994ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
6972024-10-09T22:51:42.994ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
6982024-10-09T22:51:42.994ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
6992024-10-09T22:51:42.994ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig
7002024-10-09T22:51:42.994ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7012024-10-09T22:51:42.995ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
7022024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7032024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
7042024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
7052024-10-09T22:51:42.995ZWARNtest_snapshot_expunge (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
7062024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 78.567\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7072024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7082024-10-09T22:51:42.995ZWARNtest_snapshot_expunge (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7092024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 44.978\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7102024-10-09T22:51:42.995ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
7112024-10-09T22:51:42.995ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
7122024-10-09T22:51:42.995ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7132024-10-09T22:51:42.995ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
7142024-10-09T22:51:42.996ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7152024-10-09T22:51:42.996ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
7162024-10-09T22:51:42.996ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
7172024-10-09T22:51:42.997ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 173.592\u{b5}s iteration = 1 status = {"error":"task disabled"}
7182024-10-09T22:51:42.997ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7192024-10-09T22:51:42.997ZINFOtest_snapshot_expunge (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7202024-10-09T22:51:42.997ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 75.407\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7212024-10-09T22:51:42.997ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7222024-10-09T22:51:42.997ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
7232024-10-09T22:51:42.997ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7242024-10-09T22:51:42.997ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
7252024-10-09T22:51:42.997ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
7262024-10-09T22:51:42.998ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
7272024-10-09T22:51:42.998ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7282024-10-09T22:51:42.998ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
7292024-10-09T22:51:42.998ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7302024-10-09T22:51:42.998ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
7312024-10-09T22:51:42.998ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7322024-10-09T22:51:42.998ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7332024-10-09T22:51:42.998ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7342024-10-09T22:51:42.999ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
7352024-10-09T22:51:42.999ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7362024-10-09T22:51:42.999ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
7372024-10-09T22:51:42.999ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7382024-10-09T22:51:42.999ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
7392024-10-09T22:51:42.999ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7402024-10-09T22:51:43.004ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
7412024-10-09T22:51:43.004ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7422024-10-09T22:51:43.004ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
7432024-10-09T22:51:43.004ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7442024-10-09T22:51:43.005ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7452024-10-09T22:51:43.005ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7462024-10-09T22:51:43.005ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
7472024-10-09T22:51:43.005ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7482024-10-09T22:51:43.005ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
7492024-10-09T22:51:43.005ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7502024-10-09T22:51:43.006ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
7512024-10-09T22:51:43.006ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7522024-10-09T22:51:43.006ZINFOtest_snapshot_expunge (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7532024-10-09T22:51:43.006ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = instance_updater elapsed = 288.447\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7542024-10-09T22:51:43.006ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7552024-10-09T22:51:43.006ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
7562024-10-09T22:51:43.006ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7572024-10-09T22:51:43.010ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7582024-10-09T22:51:43.010ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7592024-10-09T22:51:43.010ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7602024-10-09T22:51:43.010ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
7612024-10-09T22:51:43.010ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7622024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7632024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7642024-10-09T22:51:43.015ZINFOtest_snapshot_expunge (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7652024-10-09T22:51:43.015ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
7662024-10-09T22:51:43.015ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7672024-10-09T22:51:43.015ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
7682024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7692024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7702024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7712024-10-09T22:51:43.015ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
7722024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7732024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7742024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7752024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (SagaRecoverer): listing candidate sagas for recovery
7762024-10-09T22:51:43.015ZTRACtest_snapshot_expunge (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database
7772024-10-09T22:51:43.015ZDEBGtest_snapshot_expunge (SagaRecoverer): roles roles = RoleSet { roles: {} }
7782024-10-09T22:51:43.016ZDEBGtest_snapshot_expunge (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database result = Ok(())
7792024-10-09T22:51:43.016ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7802024-10-09T22:51:43.016ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
7812024-10-09T22:51:43.016ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
7822024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
7832024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
7842024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 61.068\u{b5}s iteration = 1 status = {"errors":[],"requests_created_ok":[],"start_invoked_ok":[]}
7852024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
7862024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 21.239\u{b5}s iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
7872024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
7882024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 22.839\u{b5}s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[]}
7892024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
7902024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 37.729\u{b5}s iteration = 1 status = {"errors":[],"records_set_to_done":[]}
7912024-10-09T22:51:43.017ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
7922024-10-09T22:51:43.017ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7932024-10-09T22:51:43.017ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
7942024-10-09T22:51:43.017ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
7952024-10-09T22:51:43.018ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
7962024-10-09T22:51:43.036ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:37331 req_id = 8413ac1f-7999-4512-90a4-87eefb4884b2 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
7972024-10-09T22:51:43.036ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 20 35 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 5..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:52204 req_id = 6317b3a9-8a2b-40f6-b15c-fee0ce215be1
7982024-10-09T22:51:43.036ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 8245,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52204 req_id = 6317b3a9-8a2b-40f6-b15c-fee0ce215be1
7992024-10-09T22:51:43.038ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 8245, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:52204 req_id = 6317b3a9-8a2b-40f6-b15c-fee0ce215be1
8002024-10-09T22:51:43.038ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: af 6b 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .k..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:57883 req_id = e500db9d-219e-43d1-9f07-5537c46046de
8012024-10-09T22:51:43.038ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 44907,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57883 req_id = e500db9d-219e-43d1-9f07-5537c46046de
8022024-10-09T22:51:43.038ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 44907, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57883 req_id = e500db9d-219e-43d1-9f07-5537c46046de
8032024-10-09T22:51:43.040ZINFOtest_snapshot_expunge (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
8042024-10-09T22:51:43.040ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8052024-10-09T22:51:43.040ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8062024-10-09T22:51:43.040ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
8072024-10-09T22:51:43.040ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8082024-10-09T22:51:43.041ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8092024-10-09T22:51:43.042ZWARNtest_snapshot_expunge (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8102024-10-09T22:51:43.042ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 56.841404ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8112024-10-09T22:51:43.042ZWARNtest_snapshot_expunge (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8122024-10-09T22:51:43.042ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 55.465979ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8132024-10-09T22:51:43.057ZINFOtest_snapshot_expunge (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2024-10-09 22:41:42.987283176 UTC pruned = {}
8142024-10-09T22:51:43.057ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 70.335199ms iteration = 1 status = {"expiration":"2024-10-09T22:41:42.987283176Z","pruned":[]}
8152024-10-09T22:51:43.094ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8162024-10-09T22:51:43.101ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8172024-10-09T22:51:43.150ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8182024-10-09T22:51:43.156ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
8192024-10-09T22:51:43.156ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8202024-10-09T22:51:43.156ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8212024-10-09T22:51:43.157ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8222024-10-09T22:51:43.158ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 163.381032ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8232024-10-09T22:51:43.158ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: f1 f8 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:52046 req_id = 05741890-d90f-4083-889d-c7efbe72b93b
8242024-10-09T22:51:43.159ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61944,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52046 req_id = 05741890-d90f-4083-889d-c7efbe72b93b
8252024-10-09T22:51:43.159ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 61944, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:52046 req_id = 05741890-d90f-4083-889d-c7efbe72b93b
8262024-10-09T22:51:43.159ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: c8 2e 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:64318 req_id = 5c017aae-f609-4aa4-8744-e9ba4214fcee
8272024-10-09T22:51:43.160ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 51246,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64318 req_id = 5c017aae-f609-4aa4-8744-e9ba4214fcee
8282024-10-09T22:51:43.160ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 51246, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:64318 req_id = 5c017aae-f609-4aa4-8744-e9ba4214fcee
8292024-10-09T22:51:43.160ZERROtest_snapshot_expunge (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_v4_garbage_collector error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8302024-10-09T22:51:43.161ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = nat_v4_garbage_collector elapsed = 170.143559ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8312024-10-09T22:51:43.161ZERROtest_snapshot_expunge (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8322024-10-09T22:51:43.161ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 167.41105ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8332024-10-09T22:51:43.226ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8342024-10-09T22:51:43.234ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8352024-10-09T22:51:43.234ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
8362024-10-09T22:51:43.234ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8372024-10-09T22:51:43.234ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
8382024-10-09T22:51:43.235ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8392024-10-09T22:51:43.241ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8402024-10-09T22:51:43.241ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
8412024-10-09T22:51:43.241ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8422024-10-09T22:51:43.242ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
8432024-10-09T22:51:43.243ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8442024-10-09T22:51:43.249ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
8452024-10-09T22:51:43.249ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
8462024-10-09T22:51:43.249ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
8472024-10-09T22:51:43.250ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
8482024-10-09T22:51:43.308ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8492024-10-09T22:51:43.318ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
8502024-10-09T22:51:43.318ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
8512024-10-09T22:51:43.318ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
8522024-10-09T22:51:43.319ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
8532024-10-09T22:51:43.320ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8542024-10-09T22:51:43.326ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
8552024-10-09T22:51:43.326ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
8562024-10-09T22:51:43.326ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
8572024-10-09T22:51:43.327ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
8582024-10-09T22:51:43.360ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
8592024-10-09T22:51:43.360ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8602024-10-09T22:51:43.361ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
8612024-10-09T22:51:43.361ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8622024-10-09T22:51:43.366ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
8632024-10-09T22:51:43.366ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
8642024-10-09T22:51:43.366ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8652024-10-09T22:51:43.366ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
8662024-10-09T22:51:43.366ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
8672024-10-09T22:51:43.367ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
8682024-10-09T22:51:43.389ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
8692024-10-09T22:51:43.389ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
8702024-10-09T22:51:43.390ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
8712024-10-09T22:51:43.394ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 378.588508ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
8722024-10-09T22:51:43.397ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8732024-10-09T22:51:43.407ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
8742024-10-09T22:51:43.425ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
8752024-10-09T22:51:43.425ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
8762024-10-09T22:51:43.427ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
8772024-10-09T22:51:43.440ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
8782024-10-09T22:51:43.440ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8792024-10-09T22:51:43.440ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8802024-10-09T22:51:43.440ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8812024-10-09T22:51:43.440ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8822024-10-09T22:51:43.501ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 503.746047ms iteration = 1 status = {}
8832024-10-09T22:51:43.506ZWARNtest_snapshot_expunge (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
8842024-10-09T22:51:43.506ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 511.267188ms iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
8852024-10-09T22:51:43.530ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8862024-10-09T22:51:43.549ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
8872024-10-09T22:51:43.550ZWARNtest_snapshot_expunge (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
8882024-10-09T22:51:43.573ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 575.815563ms iteration = 1 status = {"error":"inventory collection is None"}
8892024-10-09T22:51:43.573ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
8902024-10-09T22:51:43.573ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
8912024-10-09T22:51:43.574ZINFOtest_snapshot_expunge (SagaRecoverer): listed in-progress sagas count = 0
8922024-10-09T22:51:43.574ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 559.686994ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
8932024-10-09T22:51:43.574ZWARNtest_snapshot_expunge (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
8942024-10-09T22:51:43.574ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 591.585279ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
8952024-10-09T22:51:43.574ZDEBGtest_snapshot_expunge (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
8962024-10-09T22:51:43.589ZINFOtest_snapshot_expunge (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
8972024-10-09T22:51:43.598ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 584.180053ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
8982024-10-09T22:51:43.604ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
8992024-10-09T22:51:43.605ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9002024-10-09T22:51:43.605ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9012024-10-09T22:51:43.606ZTRACtest_snapshot_expunge (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
9022024-10-09T22:51:43.606ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
9032024-10-09T22:51:43.606ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
9042024-10-09T22:51:43.607ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
9052024-10-09T22:51:43.607ZINFOtest_snapshot_expunge (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
9062024-10-09T22:51:43.607ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 601.736945ms iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
9072024-10-09T22:51:43.629ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 79 3e 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 y>..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:64777 req_id = 71f4f019-04f5-4902-8749-e2b5357ebbea
9082024-10-09T22:51:43.629ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 31038,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64777 req_id = 71f4f019-04f5-4902-8749-e2b5357ebbea
9092024-10-09T22:51:43.630ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 31038, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:64777 req_id = 71f4f019-04f5-4902-8749-e2b5357ebbea
9102024-10-09T22:51:43.631ZWARNtest_snapshot_expunge (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9112024-10-09T22:51:43.631ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 635.52575ms iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9122024-10-09T22:51:43.648ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9132024-10-09T22:51:43.659ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
9142024-10-09T22:51:43.659ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9152024-10-09T22:51:43.660ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9162024-10-09T22:51:43.660ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9172024-10-09T22:51:43.691ZWARNtest_snapshot_expunge (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
9182024-10-09T22:51:43.691ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 705.913836ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
9192024-10-09T22:51:43.691ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
9202024-10-09T22:51:43.691ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
9212024-10-09T22:51:43.691ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9222024-10-09T22:51:43.691ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9232024-10-09T22:51:43.692ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9242024-10-09T22:51:43.713ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
9252024-10-09T22:51:43.713ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
9262024-10-09T22:51:43.713ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9272024-10-09T22:51:43.713ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
9282024-10-09T22:51:43.713ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
9292024-10-09T22:51:43.714ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
9302024-10-09T22:51:43.714ZINFOtest_snapshot_expunge (dropshot_internal): request completed latency_us = 678264 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:37331 req_id = 8413ac1f-7999-4512-90a4-87eefb4884b2 response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
9312024-10-09T22:51:43.714ZDEBGtest_snapshot_expunge (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:46595/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "8413ac1f-7999-4512-90a4-87eefb4884b2", "date": "Wed, 09 Oct 2024 22:51:43 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9322024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9332024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9342024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9352024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9362024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9372024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9382024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9392024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9402024-10-09T22:51:43.717ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56532 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9412024-10-09T22:51:43.717ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:56532 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9422024-10-09T22:51:43.722ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:56532 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9432024-10-09T22:51:43.722ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:56532 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9442024-10-09T22:51:43.723ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9452024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9462024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9472024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9482024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9492024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9502024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9512024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9522024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41497 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9532024-10-09T22:51:43.724ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:41497 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9542024-10-09T22:51:43.724ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:41497 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9552024-10-09T22:51:43.725ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:41497 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9562024-10-09T22:51:43.725ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9572024-10-09T22:51:43.725ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9582024-10-09T22:51:43.725ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9592024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9602024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9612024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9622024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9632024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9642024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:46419 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9652024-10-09T22:51:43.726ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:46419 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9662024-10-09T22:51:43.726ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:46419 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9672024-10-09T22:51:43.726ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:46419 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9682024-10-09T22:51:43.727ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9692024-10-09T22:51:43.727ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9702024-10-09T22:51:43.727ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9712024-10-09T22:51:43.727ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9722024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9732024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9742024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9752024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9762024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63041 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9772024-10-09T22:51:43.728ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:63041 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9782024-10-09T22:51:43.728ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:63041 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9792024-10-09T22:51:43.729ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:63041 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9802024-10-09T22:51:43.729ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9812024-10-09T22:51:43.729ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9822024-10-09T22:51:43.729ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9832024-10-09T22:51:43.729ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9842024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9852024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9862024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9872024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9882024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57912 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9892024-10-09T22:51:43.730ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:57912 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9902024-10-09T22:51:43.730ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:57912 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9912024-10-09T22:51:43.730ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:57912 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9922024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9932024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9942024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9952024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9962024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9972024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9982024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9992024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10002024-10-09T22:51:43.732ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42811 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10012024-10-09T22:51:43.732ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:42811 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10022024-10-09T22:51:43.733ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:42811 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10032024-10-09T22:51:43.734ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:42811 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10042024-10-09T22:51:43.738ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10052024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10062024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10072024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10082024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10092024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10102024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10112024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10122024-10-09T22:51:43.739ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41887 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10132024-10-09T22:51:43.739ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:41887 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10142024-10-09T22:51:43.740ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:41887 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10152024-10-09T22:51:43.740ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:41887 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10162024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10172024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10182024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10192024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10202024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10212024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10222024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10232024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10242024-10-09T22:51:43.741ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42174 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10252024-10-09T22:51:43.741ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:42174 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10262024-10-09T22:51:43.742ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:42174 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10272024-10-09T22:51:43.742ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:42174 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10282024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10292024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10302024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10312024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10322024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10332024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10342024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10352024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10362024-10-09T22:51:43.743ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49007 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10372024-10-09T22:51:43.743ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:49007 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10382024-10-09T22:51:43.744ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:49007 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10392024-10-09T22:51:43.744ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:49007 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10402024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10412024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10422024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10432024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10442024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10452024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10462024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10472024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10482024-10-09T22:51:43.745ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33079 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10492024-10-09T22:51:43.745ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:33079 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10502024-10-09T22:51:43.746ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:33079 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10512024-10-09T22:51:43.746ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:33079 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10522024-10-09T22:51:43.746ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_sled2
10532024-10-09T22:51:43.746ZINFOtest_snapshot_expunge (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10542024-10-09T22:51:43.883ZINFOtest_snapshot_expunge (SledAgent): created simulated sled agent server = 039be560-54cc-49e3-88df-1a29dadbf913 sim_mode = Explicit sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10552024-10-09T22:51:43.888ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10562024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10572024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10582024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /bootstore/status sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10592024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /cockroachdb sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10602024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /datasets sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10612024-10-09T22:51:43.891ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /datasets sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10622024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /disks/{disk_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10632024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /disks/{disk_id}/poke sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10642024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /eip-gateways sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10652024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /inventory sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10662024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /network-bootstore-config sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10672024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /network-bootstore-config sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10682024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /omicron-physical-disks sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10692024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /omicron-physical-disks sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10702024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /omicron-zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10712024-10-09T22:51:43.892ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /omicron-zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10722024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /sled-identifiers sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10732024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /sled-role sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10742024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /sleds sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10752024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /switch-ports sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10762024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /timesync sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10772024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /update sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10782024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = DELETE path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10792024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10802024-10-09T22:51:43.893ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10812024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = DELETE path = /vmms/{propolis_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10822024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /vmms/{propolis_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10832024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10842024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10852024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10862024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /vmms/{propolis_id}/poke sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10872024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10882024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10892024-10-09T22:51:43.894ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /vmms/{propolis_id}/state sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10902024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /vmms/{propolis_id}/state sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10912024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10922024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /vpc-routes sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10932024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /vpc-routes sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10942024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10952024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /zones/bundle-cleanup sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10962024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones/bundle-cleanup/context sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10972024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = PUT path = /zones/bundle-cleanup/context sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10982024-10-09T22:51:43.895ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones/bundle-cleanup/utilization sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10992024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones/bundles sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11002024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones/bundles/{zone_name} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11012024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = POST path = /zones/bundles/{zone_name} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11022024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11032024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11042024-10-09T22:51:43.896ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:34518 method = GET path = /zpools sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11052024-10-09T22:51:43.896ZINFOtest_snapshot_expunge (dropshot): listening local_addr = [::1]:34518 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11062024-10-09T22:51:43.897ZDEBGtest_snapshot_expunge (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:34518 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11072024-10-09T22:51:43.898ZDEBGtest_snapshot_expunge (omicron_sled_agent::sim::Server): contacting server nexus sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11082024-10-09T22:51:43.898ZDEBGtest_snapshot_expunge (NexusClient): client request body = Some(Body) method = POST sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = http://127.0.0.1:46595/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
11092024-10-09T22:51:43.899ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11102024-10-09T22:51:43.905ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
11112024-10-09T22:51:43.905ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
11122024-10-09T22:51:43.905ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
11132024-10-09T22:51:43.906ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
11142024-10-09T22:51:43.906ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_replacement elapsed = 906.845364ms iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
11152024-10-09T22:51:43.907ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 902.789967ms iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
11162024-10-09T22:51:43.908ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11172024-10-09T22:51:43.908ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11182024-10-09T22:51:43.911ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11192024-10-09T22:51:43.911ZTRACtest_snapshot_expunge (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
11202024-10-09T22:51:43.911ZWARNtest_snapshot_expunge (BackgroundTasks): instance reincarnation completed with errors background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0 query_errors = 0 restart_errors = 0
11212024-10-09T22:51:43.912ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 905.586814ms iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
11222024-10-09T22:51:43.913ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:47259
11232024-10-09T22:51:43.914ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:47259 req_id = bfd74f07-661d-4b71-a65f-d40013d07d5a uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
11242024-10-09T22:51:43.914ZINFOtest_snapshot_expunge (nexus): registered sled agent sled_uuid = 039be560-54cc-49e3-88df-1a29dadbf913
11252024-10-09T22:51:43.919ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
11262024-10-09T22:51:43.919ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11272024-10-09T22:51:43.919ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11282024-10-09T22:51:43.920ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11292024-10-09T22:51:43.920ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11302024-10-09T22:51:43.924ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
11312024-10-09T22:51:43.924ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
11322024-10-09T22:51:43.924ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
11332024-10-09T22:51:43.926ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
11342024-10-09T22:51:44.046ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11352024-10-09T22:51:44.046ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11362024-10-09T22:51:44.047ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 0d 8d 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:50472 req_id = 1f1f0fd0-c39b-4b8d-a995-29b577cf84c2
11372024-10-09T22:51:44.047ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 3469,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50472 req_id = 1f1f0fd0-c39b-4b8d-a995-29b577cf84c2
11382024-10-09T22:51:44.048ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 3469, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:50472 req_id = 1f1f0fd0-c39b-4b8d-a995-29b577cf84c2
11392024-10-09T22:51:44.048ZWARNtest_snapshot_expunge (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
11402024-10-09T22:51:44.048ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 335.302206ms iteration = 2 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
11412024-10-09T22:51:44.091ZWARNtest_snapshot_expunge (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
11422024-10-09T22:51:44.091ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 1.101191747s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
11432024-10-09T22:51:44.116ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11442024-10-09T22:51:44.116ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11452024-10-09T22:51:44.116ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11462024-10-09T22:51:44.117ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11472024-10-09T22:51:44.201ZINFOtest_snapshot_expunge (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
11482024-10-09T22:51:44.202ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:59608/vpc-routes
11492024-10-09T22:51:44.203ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:62231 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11502024-10-09T22:51:44.206ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11512024-10-09T22:51:44.237ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11522024-10-09T22:51:44.237ZTRACtest_snapshot_expunge (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
11532024-10-09T22:51:44.237ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
11542024-10-09T22:51:44.237ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
11552024-10-09T22:51:44.237ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11562024-10-09T22:51:44.237ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11572024-10-09T22:51:44.238ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11582024-10-09T22:51:44.239ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
11592024-10-09T22:51:44.239ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
11602024-10-09T22:51:44.239ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11612024-10-09T22:51:44.239ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
11622024-10-09T22:51:44.239ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
11632024-10-09T22:51:44.240ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
11642024-10-09T22:51:44.240ZINFOtest_snapshot_expunge (dropshot_internal): request completed latency_us = 326346 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:47259 req_id = bfd74f07-661d-4b71-a65f-d40013d07d5a response_code = 204 uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
11652024-10-09T22:51:44.241ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = GET remote_addr = [::1]:62231 req_id = 7b1f45c2-54c4-4a0b-a9e1-e89b73708b67 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11662024-10-09T22:51:44.242ZDEBGtest_snapshot_expunge (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:46595/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913", status: 204, headers: {"x-request-id": "bfd74f07-661d-4b71-a65f-d40013d07d5a", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} }) sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11672024-10-09T22:51:44.242ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 1389 local_addr = [::1]:59608 method = GET remote_addr = [::1]:62231 req_id = 7b1f45c2-54c4-4a0b-a9e1-e89b73708b67 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11682024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11692024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11702024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11712024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11722024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11732024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11742024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11752024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11762024-10-09T22:51:44.244ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35914 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11772024-10-09T22:51:44.244ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:35914 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11782024-10-09T22:51:44.246ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:35914 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11792024-10-09T22:51:44.246ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:35914 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11802024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11812024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11822024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11832024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11842024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11852024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11862024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11872024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11882024-10-09T22:51:44.247ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36642 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11892024-10-09T22:51:44.247ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:36642 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11902024-10-09T22:51:44.248ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:36642 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11912024-10-09T22:51:44.248ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:36642 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11922024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11932024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11942024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11952024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11962024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11972024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11982024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11992024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12002024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:38328 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12012024-10-09T22:51:44.249ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:38328 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12022024-10-09T22:51:44.249ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:38328 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12032024-10-09T22:51:44.249ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:38328 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12042024-10-09T22:51:44.250ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12052024-10-09T22:51:44.250ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12062024-10-09T22:51:44.250ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12072024-10-09T22:51:44.250ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12082024-10-09T22:51:44.250ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12092024-10-09T22:51:44.251ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12102024-10-09T22:51:44.251ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12112024-10-09T22:51:44.251ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12122024-10-09T22:51:44.251ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36993 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12132024-10-09T22:51:44.251ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:36993 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12142024-10-09T22:51:44.251ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:36993 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12152024-10-09T22:51:44.251ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:36993 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12162024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12172024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12182024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12192024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12202024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12212024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12222024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12232024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12242024-10-09T22:51:44.252ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:37768 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12252024-10-09T22:51:44.252ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:37768 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12262024-10-09T22:51:44.253ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:37768 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12272024-10-09T22:51:44.253ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:37768 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12282024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12292024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12302024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12312024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12322024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12332024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12342024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12352024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12362024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:44377 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12372024-10-09T22:51:44.254ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:44377 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12382024-10-09T22:51:44.254ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:44377 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12392024-10-09T22:51:44.255ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:44377 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12402024-10-09T22:51:44.255ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12412024-10-09T22:51:44.255ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12422024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12432024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12442024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12452024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12462024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12472024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12482024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:56811 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12492024-10-09T22:51:44.256ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:56811 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12502024-10-09T22:51:44.256ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:56811 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12512024-10-09T22:51:44.256ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:56811 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12522024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12532024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12542024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12552024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12562024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12572024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12582024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12592024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12602024-10-09T22:51:44.258ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:47376 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12612024-10-09T22:51:44.258ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:47376 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12622024-10-09T22:51:44.259ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:47376 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12632024-10-09T22:51:44.259ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:47376 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12642024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12652024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12662024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12672024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12682024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12692024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12702024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12712024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12722024-10-09T22:51:44.261ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:41365 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12732024-10-09T22:51:44.261ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:41365 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12742024-10-09T22:51:44.262ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:41365 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12752024-10-09T22:51:44.262ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:41365 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12762024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12772024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12782024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12792024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12802024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12812024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12822024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12832024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12842024-10-09T22:51:44.279ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:43541 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12852024-10-09T22:51:44.279ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:43541 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12862024-10-09T22:51:44.280ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:43541 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12872024-10-09T22:51:44.280ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:43541 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12882024-10-09T22:51:44.280ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_crucible_pantry
12892024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12902024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12912024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12922024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12932024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12942024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12952024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12962024-10-09T22:51:44.281ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12972024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12982024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12992024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge (dropshot): registered endpoint kind = pantry local_addr = [::1]:37717 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13002024-10-09T22:51:44.282ZINFOtest_snapshot_expunge (dropshot): listening kind = pantry local_addr = [::1]:37717 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13012024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:37717 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13022024-10-09T22:51:44.282ZINFOtest_snapshot_expunge (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:37717 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13032024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge (init_with_steps): Running step populate_internal_dns
13042024-10-09T22:51:44.282ZDEBGtest_snapshot_expunge: Populating Internal DNS
13052024-10-09T22:51:44.375ZINFOtest_snapshot_expunge: DNS population: DnsConfigParams { generation: 1, time_created: 2024-10-09T22:51:44.375337113Z, zones: [ DnsConfigZone { records: { "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "_cockroach._tcp": [ Srv( Srv { port: 53251, prio: 0, target: "fccdd757-1cb8-473e-9861-5f85d36dc1f8.host.control-plane.oxide.internal", weight: 0, }, ), ], "_clickhouse-native._tcp": [ Srv( Srv { port: 9000, prio: 0, target: "931ce756-c349-4a50-98c7-b99f2b969a63.host.control-plane.oxide.internal", weight: 0, }, ), ], "_external-dns._tcp": [ Srv( Srv { port: 45535, prio: 0, target: "a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal", weight: 0, }, ), ], "_nameservice._tcp": [ Srv( Srv { port: 55581, prio: 0, target: "29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal", weight: 0, }, ), ], "da07d736-2b84-4e5b-b741-192797443e8a.host": [ Aaaa( ::1, ), ], "a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host": [ Aaaa( ::1, ), ], "_nexus._tcp": [ Srv( Srv { port: 46595, prio: 0, target: "f6fb5253-e555-4200-83a7-6591902f4bd5.host.control-plane.oxide.internal", weight: 0, }, ), ], "f6fb5253-e555-4200-83a7-6591902f4bd5.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "_clickhouse._tcp": [ Srv( Srv { port: 35867, prio: 0, target: "931ce756-c349-4a50-98c7-b99f2b969a63.host.control-plane.oxide.internal", weight: 0, }, ), ], "_mgs._tcp": [ Srv( Srv { port: 43448, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 61986, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "_mgd._tcp": [ Srv( Srv { port: 41274, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 60030, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "fccdd757-1cb8-473e-9861-5f85d36dc1f8.host": [ Aaaa( ::1, ), ], "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host": [ Aaaa( ::1, ), ], "_dendrite._tcp": [ Srv( Srv { port: 40487, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 41548, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "931ce756-c349-4a50-98c7-b99f2b969a63.host": [ Aaaa( ::1, ), ], "_crucible-pantry._tcp": [ Srv( Srv { port: 37717, prio: 0, target: "da07d736-2b84-4e5b-b741-192797443e8a.host.control-plane.oxide.internal", weight: 0, }, ), ], "29559d11-f036-42f7-bc14-98a74e8ca0d9.host": [ Aaaa( ::1, ), ], }, zone_name: "control-plane.oxide.internal", }, ], }
13062024-10-09T22:51:44.376ZDEBGtest_snapshot_expunge: client request body = Some(Body) method = PUT uri = http://[::1]:55581/config
13072024-10-09T22:51:44.377ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:59608/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b1f45c2-54c4-4a0b-a9e1-e89b73708b67", "content-length": "2", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
13082024-10-09T22:51:44.377ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
13092024-10-09T22:51:44.377ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
13102024-10-09T22:51:44.378ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
13112024-10-09T22:51:44.379ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
13122024-10-09T22:51:44.379ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13132024-10-09T22:51:44.379ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
13142024-10-09T22:51:44.379ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13152024-10-09T22:51:44.380ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
13162024-10-09T22:51:44.380ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13172024-10-09T22:51:44.381ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13182024-10-09T22:51:44.381ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13192024-10-09T22:51:44.382ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13202024-10-09T22:51:44.382ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13212024-10-09T22:51:44.388ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
13222024-10-09T22:51:44.388ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
13232024-10-09T22:51:44.388ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
13242024-10-09T22:51:44.389ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
13252024-10-09T22:51:44.391ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13262024-10-09T22:51:44.397ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
13272024-10-09T22:51:44.397ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
13282024-10-09T22:51:44.397ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13292024-10-09T22:51:44.397ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
13302024-10-09T22:51:44.397ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13312024-10-09T22:51:44.398ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
13322024-10-09T22:51:44.400ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13332024-10-09T22:51:44.400ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13342024-10-09T22:51:44.400ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13352024-10-09T22:51:44.401ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13362024-10-09T22:51:44.402ZINFOtest_snapshot_expunge (http): accepted connection kind = dns local_addr = [::1]:55581 remote_addr = [::1]:42958
13372024-10-09T22:51:44.402ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
13382024-10-09T22:51:44.402ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
13392024-10-09T22:51:44.403ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13402024-10-09T22:51:44.408ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
13412024-10-09T22:51:44.409ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
13422024-10-09T22:51:44.409ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13432024-10-09T22:51:44.410ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
13442024-10-09T22:51:44.411ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13452024-10-09T22:51:44.426ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
13462024-10-09T22:51:44.426ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13472024-10-09T22:51:44.426ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13482024-10-09T22:51:44.430ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13492024-10-09T22:51:44.432ZTRACtest_snapshot_expunge (http): incoming request kind = dns local_addr = [::1]:55581 method = PUT remote_addr = [::1]:42958 req_id = 0732d068-1452-4814-ba1a-b6e1a43b3128 uri = /config
13502024-10-09T22:51:44.432ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: f0 71 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .q..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:61683 req_id = 6ac07a43-d4df-4857-b9dc-36b33d8ec251
13512024-10-09T22:51:44.433ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61553,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61683 req_id = 6ac07a43-d4df-4857-b9dc-36b33d8ec251
13522024-10-09T22:51:44.434ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 61553, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:61683 req_id = 6ac07a43-d4df-4857-b9dc-36b33d8ec251
13532024-10-09T22:51:44.435ZINFOtest_snapshot_expunge (store): attempting generation update new_generation = 1 req_id = 0732d068-1452-4814-ba1a-b6e1a43b3128
13542024-10-09T22:51:44.435ZINFOtest_snapshot_expunge (store): pruning trees for generations newer than 0
13552024-10-09T22:51:44.435ZDEBGtest_snapshot_expunge (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
13562024-10-09T22:51:44.440ZDEBGtest_snapshot_expunge (store): updating current config
13572024-10-09T22:51:44.445ZDEBGtest_snapshot_expunge (store): flushing default tree
13582024-10-09T22:51:44.447ZINFOtest_snapshot_expunge (store): pruning trees for generations older than 1 keep = 3
13592024-10-09T22:51:44.447ZINFOtest_snapshot_expunge (store): updated generation new_generation = 1 req_id = 0732d068-1452-4814-ba1a-b6e1a43b3128
13602024-10-09T22:51:44.448ZINFOtest_snapshot_expunge (http): request completed kind = dns latency_us = 15883 local_addr = [::1]:55581 method = PUT remote_addr = [::1]:42958 req_id = 0732d068-1452-4814-ba1a-b6e1a43b3128 response_code = 204 uri = /config
13612024-10-09T22:51:44.673ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913 background_task = v2p_manager body = None method = GET uri = http://[::1]:34518/v2p
13622024-10-09T22:51:44.674ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13632024-10-09T22:51:44.674ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13642024-10-09T22:51:44.675ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13652024-10-09T22:51:44.675ZINFOtest_snapshot_expunge (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
13662024-10-09T22:51:44.676ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:59608/eip-gateways
13672024-10-09T22:51:44.686ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:34518 remote_addr = [::1]:56028 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
13682024-10-09T22:51:44.687ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = PUT remote_addr = [::1]:62231 req_id = 0923a39b-886b-471a-8c8d-ebb184151093 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
13692024-10-09T22:51:44.687ZWARNtest_snapshot_expunge (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
13702024-10-09T22:51:44.687ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 448.413272ms iteration = 3 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
13712024-10-09T22:51:44.689ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 2136 local_addr = [::1]:59608 method = PUT remote_addr = [::1]:62231 req_id = 0923a39b-886b-471a-8c8d-ebb184151093 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
13722024-10-09T22:51:44.689ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13732024-10-09T22:51:44.689ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13742024-10-09T22:51:44.690ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13752024-10-09T22:51:44.691ZDEBGtest_snapshot_expunge: client response result = Ok(Response { url: "http://[::1]:55581/config", status: 204, headers: {"x-request-id": "0732d068-1452-4814-ba1a-b6e1a43b3128", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
13762024-10-09T22:51:44.693ZDEBGtest_snapshot_expunge (init_with_steps): Running step configure_sled_agent1
13772024-10-09T22:51:44.785ZDEBGtest_snapshot_expunge: client request body = Some(Body) method = PUT uri = http://[::1]:59608/omicron-zones
13782024-10-09T22:51:44.791ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:34518 method = GET remote_addr = [::1]:56028 req_id = cac6fdb9-ed1c-40aa-807d-a42d54c20d1f sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /v2p
13792024-10-09T22:51:44.791ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:59608/eip-gateways", status: 204, headers: {"x-request-id": "0923a39b-886b-471a-8c8d-ebb184151093", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
13802024-10-09T22:51:44.792ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 1.780583339s iteration = 1 status = {}
13812024-10-09T22:51:44.793ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 6349 local_addr = [::1]:34518 method = GET remote_addr = [::1]:56028 req_id = cac6fdb9-ed1c-40aa-807d-a42d54c20d1f response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /v2p
13822024-10-09T22:51:44.795ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:42511 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13832024-10-09T22:51:44.795ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:34518/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "cac6fdb9-ed1c-40aa-807d-a42d54c20d1f", "content-length": "2", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
13842024-10-09T22:51:44.795ZINFOtest_snapshot_expunge (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-039be560
13852024-10-09T22:51:44.796ZINFOtest_snapshot_expunge (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-039be560
13862024-10-09T22:51:44.796ZINFOtest_snapshot_expunge (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-039be560
13872024-10-09T22:51:44.798ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:59608/v2p
13882024-10-09T22:51:44.800ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13892024-10-09T22:51:44.800ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13902024-10-09T22:51:44.801ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13912024-10-09T22:51:44.802ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:37795 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13922024-10-09T22:51:44.804ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = PUT remote_addr = [::1]:42511 req_id = a7e28842-1cf1-41c9-b8ec-a5b0abc05a99 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
13932024-10-09T22:51:44.804ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = GET remote_addr = [::1]:37795 req_id = e8ff7515-0b1f-474f-812c-5b75b5865525 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13942024-10-09T22:51:44.815ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 11125 local_addr = [::1]:59608 method = PUT remote_addr = [::1]:42511 req_id = a7e28842-1cf1-41c9-b8ec-a5b0abc05a99 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
13952024-10-09T22:51:44.815ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 10969 local_addr = [::1]:59608 method = GET remote_addr = [::1]:37795 req_id = e8ff7515-0b1f-474f-812c-5b75b5865525 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13962024-10-09T22:51:44.815ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
13972024-10-09T22:51:44.815ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13982024-10-09T22:51:44.815ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13992024-10-09T22:51:44.815ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14002024-10-09T22:51:44.816ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14012024-10-09T22:51:44.817ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:59608/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8ff7515-0b1f-474f-812c-5b75b5865525", "content-length": "2", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
14022024-10-09T22:51:44.817ZINFOtest_snapshot_expunge (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
14032024-10-09T22:51:44.817ZINFOtest_snapshot_expunge (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
14042024-10-09T22:51:44.817ZINFOtest_snapshot_expunge (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
14052024-10-09T22:51:44.819ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 1.821026887s iteration = 1 status = {}
14062024-10-09T22:51:44.820ZDEBGtest_snapshot_expunge: client response result = Ok(Response { url: "http://[::1]:59608/omicron-zones", status: 204, headers: {"x-request-id": "a7e28842-1cf1-41c9-b8ec-a5b0abc05a99", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
14072024-10-09T22:51:44.820ZDEBGtest_snapshot_expunge: client request body = Some(Body) method = PUT uri = http://[::1]:59608/network-bootstore-config
14082024-10-09T22:51:44.863ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14092024-10-09T22:51:44.863ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14102024-10-09T22:51:44.863ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14112024-10-09T22:51:44.864ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14122024-10-09T22:51:44.873ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = PUT remote_addr = [::1]:42511 req_id = 2f29d240-44f0-4a3c-be26-f6fe064916b5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14132024-10-09T22:51:44.874ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 7664 local_addr = [::1]:59608 method = PUT remote_addr = [::1]:42511 req_id = 2f29d240-44f0-4a3c-be26-f6fe064916b5 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14142024-10-09T22:51:44.884ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14152024-10-09T22:51:44.884ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14162024-10-09T22:51:44.884ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14172024-10-09T22:51:44.885ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14182024-10-09T22:51:44.905ZDEBGtest_snapshot_expunge: client response result = Ok(Response { url: "http://[::1]:59608/network-bootstore-config", status: 204, headers: {"x-request-id": "2f29d240-44f0-4a3c-be26-f6fe064916b5", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
14192024-10-09T22:51:44.909ZDEBGtest_snapshot_expunge (init_with_steps): Running step configure_sled_agent2
14202024-10-09T22:51:44.997ZDEBGtest_snapshot_expunge: client request body = Some(Body) method = PUT uri = http://[::1]:34518/omicron-zones
14212024-10-09T22:51:44.999ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:34518 remote_addr = [::1]:42790 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
14222024-10-09T22:51:45.003ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14232024-10-09T22:51:45.020ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
14242024-10-09T22:51:45.020ZTRACtest_snapshot_expunge (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
14252024-10-09T22:51:45.020ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14262024-10-09T22:51:45.020ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14272024-10-09T22:51:45.021ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14282024-10-09T22:51:45.024ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:34518 method = PUT remote_addr = [::1]:42790 req_id = f619bf81-aa65-4c21-aa3f-634fb501bcee sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
14292024-10-09T22:51:45.027ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14302024-10-09T22:51:45.027ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14312024-10-09T22:51:45.028ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14322024-10-09T22:51:45.032ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 8068 local_addr = [::1]:34518 method = PUT remote_addr = [::1]:42790 req_id = f619bf81-aa65-4c21-aa3f-634fb501bcee response_code = 204 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
14332024-10-09T22:51:45.036ZDEBGtest_snapshot_expunge: client response result = Ok(Response { url: "http://[::1]:34518/omicron-zones", status: 204, headers: {"x-request-id": "f619bf81-aa65-4c21-aa3f-634fb501bcee", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
14342024-10-09T22:51:45.036ZDEBGtest_snapshot_expunge: client request body = Some(Body) method = PUT uri = http://[::1]:34518/network-bootstore-config
14352024-10-09T22:51:45.044ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14362024-10-09T22:51:45.044ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14372024-10-09T22:51:45.045ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14382024-10-09T22:51:45.051ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:34518 method = PUT remote_addr = [::1]:42790 req_id = 3c9e24c8-0ca4-4761-aaf9-e56c0914211a sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /network-bootstore-config
14392024-10-09T22:51:45.051ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 306 local_addr = [::1]:34518 method = PUT remote_addr = [::1]:42790 req_id = 3c9e24c8-0ca4-4761-aaf9-e56c0914211a response_code = 204 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /network-bootstore-config
14402024-10-09T22:51:45.060ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14412024-10-09T22:51:45.060ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14422024-10-09T22:51:45.061ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14432024-10-09T22:51:45.064ZDEBGtest_snapshot_expunge: client response result = Ok(Response { url: "http://[::1]:34518/network-bootstore-config", status: 204, headers: {"x-request-id": "3c9e24c8-0ca4-4761-aaf9-e56c0914211a", "date": "Wed, 09 Oct 2024 22:51:44 GMT"} })
14442024-10-09T22:51:45.066ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_nexus_external
14452024-10-09T22:51:45.066ZDEBGtest_snapshot_expunge: Starting Nexus (external API)
14462024-10-09T22:51:46.636ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
14472024-10-09T22:51:46.636ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14482024-10-09T22:51:46.636ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14492024-10-09T22:51:46.636ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
14502024-10-09T22:51:46.638ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14512024-10-09T22:51:46.655ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
14522024-10-09T22:51:46.655ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14532024-10-09T22:51:46.655ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14542024-10-09T22:51:46.655ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14552024-10-09T22:51:46.656ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14562024-10-09T22:51:46.659ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14572024-10-09T22:51:46.664ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
14582024-10-09T22:51:46.668ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14592024-10-09T22:51:46.668ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
14602024-10-09T22:51:46.668ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14612024-10-09T22:51:46.672ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14622024-10-09T22:51:46.672ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14632024-10-09T22:51:46.672ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14642024-10-09T22:51:46.673ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14652024-10-09T22:51:46.677ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14662024-10-09T22:51:46.677ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
14672024-10-09T22:51:46.678ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14682024-10-09T22:51:46.678ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14692024-10-09T22:51:46.678ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14702024-10-09T22:51:46.678ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14712024-10-09T22:51:46.680ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14722024-10-09T22:51:46.694ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14732024-10-09T22:51:46.706ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
14742024-10-09T22:51:46.706ZTRACtest_snapshot_expunge (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
14752024-10-09T22:51:46.706ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
14762024-10-09T22:51:46.707ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14772024-10-09T22:51:46.707ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14782024-10-09T22:51:46.707ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14792024-10-09T22:51:46.707ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14802024-10-09T22:51:46.712ZINFOtest_snapshot_expunge (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
14812024-10-09T22:51:46.714ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14822024-10-09T22:51:46.714ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
14832024-10-09T22:51:46.715ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14842024-10-09T22:51:46.724ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14852024-10-09T22:51:46.724ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14862024-10-09T22:51:46.724ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14872024-10-09T22:51:46.725ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14882024-10-09T22:51:46.739ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14892024-10-09T22:51:46.739ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14902024-10-09T22:51:46.739ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14912024-10-09T22:51:46.741ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14922024-10-09T22:51:46.741ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
14932024-10-09T22:51:46.742ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14942024-10-09T22:51:46.742ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14952024-10-09T22:51:46.742ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
14962024-10-09T22:51:46.742ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14972024-10-09T22:51:46.771ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14982024-10-09T22:51:46.785ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
14992024-10-09T22:51:46.786ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15002024-10-09T22:51:46.786ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15012024-10-09T22:51:46.786ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15022024-10-09T22:51:46.790ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15032024-10-09T22:51:46.802ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
15042024-10-09T22:51:46.802ZDEBGtest_snapshot_expunge (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
15052024-10-09T22:51:46.802ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15062024-10-09T22:51:46.802ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15072024-10-09T22:51:46.804ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15082024-10-09T22:51:46.807ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15092024-10-09T22:51:46.807ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15102024-10-09T22:51:46.808ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15112024-10-09T22:51:46.834ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15122024-10-09T22:51:46.834ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15132024-10-09T22:51:46.835ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15142024-10-09T22:51:46.836ZINFOtest_snapshot_expunge (InternalApi): Using static configuration for external switchports
15152024-10-09T22:51:46.836ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15162024-10-09T22:51:46.836ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15172024-10-09T22:51:46.839ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15182024-10-09T22:51:46.855ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15192024-10-09T22:51:46.855ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15202024-10-09T22:51:46.856ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15212024-10-09T22:51:46.868ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15222024-10-09T22:51:46.868ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15232024-10-09T22:51:46.869ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15242024-10-09T22:51:46.879ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
15252024-10-09T22:51:46.879ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15262024-10-09T22:51:46.880ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15272024-10-09T22:51:46.880ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15282024-10-09T22:51:46.881ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15292024-10-09T22:51:46.886ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15302024-10-09T22:51:46.886ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15312024-10-09T22:51:46.886ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15322024-10-09T22:51:46.889ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15332024-10-09T22:51:46.902ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15342024-10-09T22:51:46.902ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15352024-10-09T22:51:46.902ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15362024-10-09T22:51:46.903ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15372024-10-09T22:51:46.905ZINFOtest_snapshot_expunge (InternalApi): Recording Rack Network Configuration
15382024-10-09T22:51:46.905ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15392024-10-09T22:51:46.905ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15402024-10-09T22:51:46.906ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15412024-10-09T22:51:46.916ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15422024-10-09T22:51:46.928ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
15432024-10-09T22:51:46.928ZTRACtest_snapshot_expunge (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
15442024-10-09T22:51:46.928ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
15452024-10-09T22:51:46.928ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15462024-10-09T22:51:46.928ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15472024-10-09T22:51:46.928ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15482024-10-09T22:51:46.929ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15492024-10-09T22:51:46.939ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15502024-10-09T22:51:46.939ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15512024-10-09T22:51:46.939ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15522024-10-09T22:51:46.940ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15532024-10-09T22:51:46.948ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15542024-10-09T22:51:46.948ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15552024-10-09T22:51:46.948ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15562024-10-09T22:51:46.949ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15572024-10-09T22:51:46.961ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15582024-10-09T22:51:46.974ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
15592024-10-09T22:51:46.974ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15602024-10-09T22:51:46.975ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15612024-10-09T22:51:46.975ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15622024-10-09T22:51:46.993ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
15632024-10-09T22:51:46.993ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet
15642024-10-09T22:51:46.993ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15652024-10-09T22:51:46.993ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15662024-10-09T22:51:46.994ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15672024-10-09T22:51:46.994ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15682024-10-09T22:51:47.001ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15692024-10-09T22:51:47.007ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
15702024-10-09T22:51:47.007ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15712024-10-09T22:51:47.008ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15722024-10-09T22:51:47.008ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15732024-10-09T22:51:47.015ZTRACtest_snapshot_expunge (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:24:05.243015Z, allowed_ips: None } background_task = service_firewall_rule_propagation
15742024-10-09T22:51:47.015ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
15752024-10-09T22:51:47.015ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
15762024-10-09T22:51:47.015ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
15772024-10-09T22:51:47.040ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15782024-10-09T22:51:47.041ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15792024-10-09T22:51:47.041ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15802024-10-09T22:51:47.041ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15812024-10-09T22:51:47.041ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15822024-10-09T22:51:47.044ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15832024-10-09T22:51:47.050ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15842024-10-09T22:51:47.050ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15852024-10-09T22:51:47.050ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15862024-10-09T22:51:47.051ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15872024-10-09T22:51:47.055ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") }
15882024-10-09T22:51:47.055ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15892024-10-09T22:51:47.055ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15902024-10-09T22:51:47.055ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15912024-10-09T22:51:47.056ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15922024-10-09T22:51:47.058ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15932024-10-09T22:51:47.066ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15942024-10-09T22:51:47.066ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15952024-10-09T22:51:47.066ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
15962024-10-09T22:51:47.067ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15972024-10-09T22:51:47.070ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") }
15982024-10-09T22:51:47.070ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15992024-10-09T22:51:47.070ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16002024-10-09T22:51:47.070ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16012024-10-09T22:51:47.071ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16022024-10-09T22:51:47.073ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16032024-10-09T22:51:47.080ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") } result = Ok(())
16042024-10-09T22:51:47.094ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") }
16052024-10-09T22:51:47.094ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16062024-10-09T22:51:47.094ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16072024-10-09T22:51:47.094ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16082024-10-09T22:51:47.095ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16092024-10-09T22:51:47.099ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16102024-10-09T22:51:47.107ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: 5e9c4a0d-239d-48e5-8616-1ab1b272cb56, lookup_type: ByName("oxide-service-pool") } result = Ok(())
16112024-10-09T22:51:47.113ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
16122024-10-09T22:51:47.113ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16132024-10-09T22:51:47.113ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16142024-10-09T22:51:47.113ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16152024-10-09T22:51:47.114ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16162024-10-09T22:51:47.118ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16172024-10-09T22:51:47.128ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
16182024-10-09T22:51:47.142ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
16192024-10-09T22:51:47.142ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
16202024-10-09T22:51:47.142ZINFOtest_snapshot_expunge (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
16212024-10-09T22:51:47.142ZDEBGtest_snapshot_expunge (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 4.13222274s
16222024-10-09T22:51:47.143ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 4.132288086s iteration = 1 status = {}
16232024-10-09T22:51:47.304ZINFOtest_snapshot_expunge (InternalApi): inserted blueprint blueprint_id = f2ad973a-e5f5-451d-b6b2-8837b67cc277
16242024-10-09T22:51:47.304ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
16252024-10-09T22:51:47.304ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16262024-10-09T22:51:47.304ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16272024-10-09T22:51:47.304ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16282024-10-09T22:51:47.305ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16292024-10-09T22:51:47.306ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16302024-10-09T22:51:47.313ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
16312024-10-09T22:51:47.318ZINFOtest_snapshot_expunge (InternalApi): No networking records needed for cockroach_db service
16322024-10-09T22:51:47.318ZINFOtest_snapshot_expunge (InternalApi): No networking records needed for clickhouse service
16332024-10-09T22:51:47.318ZINFOtest_snapshot_expunge (InternalApi): No networking records needed for internal_dns service
16342024-10-09T22:51:47.412ZINFOtest_snapshot_expunge (InternalApi): Inserted networking records for external_dns service
16352024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): Inserted networking records for nexus service
16362024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): No networking records needed for crucible_pantry service
16372024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): Inserted service networking records
16382024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): Inserted physical disks
16392024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): Inserted zpools
16402024-10-09T22:51:47.447ZINFOtest_snapshot_expunge (InternalApi): Inserted datasets
16412024-10-09T22:51:47.474ZINFOtest_snapshot_expunge (InternalApi): Populated DNS tables for internal DNS
16422024-10-09T22:51:47.484ZINFOtest_snapshot_expunge (InternalApi): Populated DNS tables for external DNS
16432024-10-09T22:51:47.501ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16442024-10-09T22:51:47.501ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16452024-10-09T22:51:47.501ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16462024-10-09T22:51:47.501ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16472024-10-09T22:51:47.502ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16482024-10-09T22:51:47.520ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16492024-10-09T22:51:47.525ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16502024-10-09T22:51:47.525ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16512024-10-09T22:51:47.525ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16522024-10-09T22:51:47.525ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16532024-10-09T22:51:47.525ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16542024-10-09T22:51:47.533ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16552024-10-09T22:51:47.567ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16562024-10-09T22:51:47.571ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16572024-10-09T22:51:47.649ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16582024-10-09T22:51:47.649ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16592024-10-09T22:51:47.649ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16602024-10-09T22:51:47.649ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16612024-10-09T22:51:47.650ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16622024-10-09T22:51:47.655ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16632024-10-09T22:51:47.664ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16642024-10-09T22:51:47.664ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16652024-10-09T22:51:47.664ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16662024-10-09T22:51:47.664ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16672024-10-09T22:51:47.664ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16682024-10-09T22:51:47.665ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16692024-10-09T22:51:47.680ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16702024-10-09T22:51:47.726ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16712024-10-09T22:51:47.733ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16722024-10-09T22:51:47.733ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16732024-10-09T22:51:47.733ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16742024-10-09T22:51:47.733ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16752024-10-09T22:51:47.735ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16762024-10-09T22:51:47.737ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16772024-10-09T22:51:47.750ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16782024-10-09T22:51:47.760ZINFOtest_snapshot_expunge (InternalApi): Created recovery silo
16792024-10-09T22:51:47.762ZINFOtest_snapshot_expunge (InternalApi): Created recovery user
16802024-10-09T22:51:47.773ZINFOtest_snapshot_expunge (InternalApi): Created recovery user's password
16812024-10-09T22:51:47.773ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, lookup_type: ById(38ae2f14-ff7c-4f61-bb90-9cd4697a8652) }
16822024-10-09T22:51:47.773ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 38ae2f14-ff7c-4f61-bb90-9cd4697a8652 resource_type = Silo
16832024-10-09T22:51:47.773ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16842024-10-09T22:51:47.773ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16852024-10-09T22:51:47.774ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16862024-10-09T22:51:47.785ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16872024-10-09T22:51:47.785ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16882024-10-09T22:51:47.785ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16892024-10-09T22:51:47.791ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16902024-10-09T22:51:47.794ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16912024-10-09T22:51:47.799ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, lookup_type: ById(38ae2f14-ff7c-4f61-bb90-9cd4697a8652) } result = Ok(())
16922024-10-09T22:51:47.799ZDEBGtest_snapshot_expunge (InternalApi): Generated role assignment queries
16932024-10-09T22:51:47.805ZINFOtest_snapshot_expunge (InternalApi): Granted Silo privileges
16942024-10-09T22:51:47.805ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16952024-10-09T22:51:47.805ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16962024-10-09T22:51:47.805ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16972024-10-09T22:51:47.805ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
16982024-10-09T22:51:47.806ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16992024-10-09T22:51:47.809ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17002024-10-09T22:51:47.816ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
17012024-10-09T22:51:47.855ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17022024-10-09T22:51:47.855ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17032024-10-09T22:51:47.856ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17042024-10-09T22:51:47.872ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17052024-10-09T22:51:47.880ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17062024-10-09T22:51:47.890ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17072024-10-09T22:51:47.893ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17082024-10-09T22:51:47.893ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17092024-10-09T22:51:47.893ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17102024-10-09T22:51:47.896ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17112024-10-09T22:51:47.896ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17122024-10-09T22:51:47.896ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17132024-10-09T22:51:47.896ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17142024-10-09T22:51:47.896ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17152024-10-09T22:51:47.899ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17162024-10-09T22:51:47.899ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17172024-10-09T22:51:47.899ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17182024-10-09T22:51:47.899ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17192024-10-09T22:51:47.901ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17202024-10-09T22:51:47.902ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17212024-10-09T22:51:47.902ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17222024-10-09T22:51:47.902ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17232024-10-09T22:51:47.908ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17242024-10-09T22:51:47.921ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17252024-10-09T22:51:47.921ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
17262024-10-09T22:51:47.921ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17272024-10-09T22:51:47.921ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17282024-10-09T22:51:47.921ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17292024-10-09T22:51:47.921ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17302024-10-09T22:51:47.922ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17312024-10-09T22:51:47.929ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17322024-10-09T22:51:47.929ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17332024-10-09T22:51:47.929ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17342024-10-09T22:51:47.930ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17352024-10-09T22:51:47.936ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17362024-10-09T22:51:47.936ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17372024-10-09T22:51:47.936ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17382024-10-09T22:51:47.937ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17392024-10-09T22:51:47.940ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17402024-10-09T22:51:47.950ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17412024-10-09T22:51:47.950ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17422024-10-09T22:51:47.950ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17432024-10-09T22:51:47.951ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17442024-10-09T22:51:47.954ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17452024-10-09T22:51:47.954ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17462024-10-09T22:51:47.955ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17472024-10-09T22:51:47.956ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17482024-10-09T22:51:47.956ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17492024-10-09T22:51:47.957ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17502024-10-09T22:51:47.959ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17512024-10-09T22:51:47.959ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17522024-10-09T22:51:47.960ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17532024-10-09T22:51:47.962ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17542024-10-09T22:51:47.962ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17552024-10-09T22:51:47.962ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17562024-10-09T22:51:47.962ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17572024-10-09T22:51:47.962ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17582024-10-09T22:51:47.971ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17592024-10-09T22:51:47.971ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17602024-10-09T22:51:47.971ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17612024-10-09T22:51:47.972ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17622024-10-09T22:51:47.976ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17632024-10-09T22:51:47.976ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17642024-10-09T22:51:47.976ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17652024-10-09T22:51:47.976ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17662024-10-09T22:51:47.978ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17672024-10-09T22:51:47.993ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17682024-10-09T22:51:47.993ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
17692024-10-09T22:51:47.993ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17702024-10-09T22:51:47.993ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17712024-10-09T22:51:47.994ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17722024-10-09T22:51:48.003ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17732024-10-09T22:51:48.003ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17742024-10-09T22:51:48.005ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17752024-10-09T22:51:48.008ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17762024-10-09T22:51:48.008ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17772024-10-09T22:51:48.009ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17782024-10-09T22:51:48.011ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17792024-10-09T22:51:48.011ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17802024-10-09T22:51:48.011ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17812024-10-09T22:51:48.013ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17822024-10-09T22:51:48.013ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17832024-10-09T22:51:48.013ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17842024-10-09T22:51:48.014ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17852024-10-09T22:51:48.014ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17862024-10-09T22:51:48.015ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17872024-10-09T22:51:48.016ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17882024-10-09T22:51:48.016ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17892024-10-09T22:51:48.016ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17902024-10-09T22:51:48.017ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17912024-10-09T22:51:48.017ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17922024-10-09T22:51:48.017ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
17932024-10-09T22:51:48.018ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17942024-10-09T22:51:48.020ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17952024-10-09T22:51:48.030ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17962024-10-09T22:51:48.030ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17972024-10-09T22:51:48.030ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17982024-10-09T22:51:48.030ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17992024-10-09T22:51:48.030ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18002024-10-09T22:51:48.030ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18012024-10-09T22:51:48.031ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18022024-10-09T22:51:48.033ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18032024-10-09T22:51:48.034ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18042024-10-09T22:51:48.034ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18052024-10-09T22:51:48.034ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18062024-10-09T22:51:48.039ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18072024-10-09T22:51:48.040ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18082024-10-09T22:51:48.040ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18092024-10-09T22:51:48.040ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18102024-10-09T22:51:48.044ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18112024-10-09T22:51:48.054ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
18122024-10-09T22:51:48.054ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18132024-10-09T22:51:48.054ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18142024-10-09T22:51:48.055ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18152024-10-09T22:51:48.059ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18162024-10-09T22:51:48.059ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18172024-10-09T22:51:48.060ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18182024-10-09T22:51:48.062ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18192024-10-09T22:51:48.062ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18202024-10-09T22:51:48.063ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18212024-10-09T22:51:48.067ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18222024-10-09T22:51:48.067ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18232024-10-09T22:51:48.069ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18242024-10-09T22:51:48.072ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18252024-10-09T22:51:48.072ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18262024-10-09T22:51:48.073ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18272024-10-09T22:51:48.076ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
18282024-10-09T22:51:48.076ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18292024-10-09T22:51:48.076ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18302024-10-09T22:51:48.076ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18312024-10-09T22:51:48.077ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18322024-10-09T22:51:48.079ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18332024-10-09T22:51:48.079ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18342024-10-09T22:51:48.079ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18352024-10-09T22:51:48.080ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18362024-10-09T22:51:48.082ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18372024-10-09T22:51:48.082ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18382024-10-09T22:51:48.082ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18392024-10-09T22:51:48.082ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18402024-10-09T22:51:48.084ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18412024-10-09T22:51:48.093ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
18422024-10-09T22:51:48.093ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
18432024-10-09T22:51:48.093ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
18442024-10-09T22:51:48.093ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18452024-10-09T22:51:48.093ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18462024-10-09T22:51:48.093ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18472024-10-09T22:51:48.094ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18482024-10-09T22:51:48.096ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18492024-10-09T22:51:48.096ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18502024-10-09T22:51:48.096ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18512024-10-09T22:51:48.097ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18522024-10-09T22:51:48.099ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18532024-10-09T22:51:48.100ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18542024-10-09T22:51:48.100ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18552024-10-09T22:51:48.101ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18562024-10-09T22:51:48.103ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18572024-10-09T22:51:48.115ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
18582024-10-09T22:51:48.116ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18592024-10-09T22:51:48.116ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18602024-10-09T22:51:48.116ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18612024-10-09T22:51:48.124ZDEBGtest_snapshot_expunge (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: b785ab3a-dba9-4d64-85e0-f125ec7ad0e8, kind: Service { id: a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b }, name: Name("external-dns-a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: 828c7936-b8c2-46e1-b7cf-4e81712e58fa, kind: Service { id: f6fb5253-e555-4200-83a7-6591902f4bd5 }, name: Name("nexus-f6fb5253-e555-4200-83a7-6591902f4bd5"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
18622024-10-09T22:51:48.124ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
18632024-10-09T22:51:48.125ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18642024-10-09T22:51:48.125ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18652024-10-09T22:51:48.125ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18662024-10-09T22:51:48.126ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18672024-10-09T22:51:48.129ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18682024-10-09T22:51:48.135ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
18692024-10-09T22:51:48.135ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18702024-10-09T22:51:48.135ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
18712024-10-09T22:51:48.136ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18722024-10-09T22:51:48.139ZTRACtest_snapshot_expunge (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:51:47.816918Z, allowed_ips: None }
18732024-10-09T22:51:48.140ZDEBGtest_snapshot_expunge (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
18742024-10-09T22:51:48.140ZDEBGtest_snapshot_expunge (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b785ab3a-dba9-4d64-85e0-f125ec7ad0e8, kind: Service { id: a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b }, name: Name("external-dns-a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 828c7936-b8c2-46e1-b7cf-4e81712e58fa, kind: Service { id: f6fb5253-e555-4200-83a7-6591902f4bd5 }, name: Name("nexus-f6fb5253-e555-4200-83a7-6591902f4bd5"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
18752024-10-09T22:51:48.140ZDEBGtest_snapshot_expunge (nexus): resolved 2 rules for sleds
18762024-10-09T22:51:48.230ZDEBGtest_snapshot_expunge (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:51:43.040172Z, time_modified: 2024-10-09T22:51:43.040172Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59608), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
18772024-10-09T22:51:48.230ZDEBGtest_snapshot_expunge (nexus): sending firewall rules to sled agents
18782024-10-09T22:51:48.230ZTRACtest_snapshot_expunge (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
18792024-10-09T22:51:48.230ZDEBGtest_snapshot_expunge (InstanceAllocator): roles roles = RoleSet { roles: {} }
18802024-10-09T22:51:48.231ZDEBGtest_snapshot_expunge (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
18812024-10-09T22:51:48.236ZTRACtest_snapshot_expunge (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
18822024-10-09T22:51:48.236ZTRACtest_snapshot_expunge (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18832024-10-09T22:51:48.236ZTRACtest_snapshot_expunge (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
18842024-10-09T22:51:48.236ZDEBGtest_snapshot_expunge (InstanceAllocator): roles roles = RoleSet { roles: {} }
18852024-10-09T22:51:48.237ZDEBGtest_snapshot_expunge (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
18862024-10-09T22:51:48.242ZDEBGtest_snapshot_expunge (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
18872024-10-09T22:51:48.247ZDEBGtest_snapshot_expunge (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
18882024-10-09T22:51:48.325ZDEBGtest_snapshot_expunge (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:59608/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18892024-10-09T22:51:48.326ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:50649 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
18902024-10-09T22:51:48.327ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = PUT remote_addr = [::1]:50649 req_id = e0fa133e-96fd-4e49-8a7e-32cc3227fe08 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18912024-10-09T22:51:48.328ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 1179 local_addr = [::1]:59608 method = PUT remote_addr = [::1]:50649 req_id = e0fa133e-96fd-4e49-8a7e-32cc3227fe08 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18922024-10-09T22:51:48.328ZDEBGtest_snapshot_expunge (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:59608/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "e0fa133e-96fd-4e49-8a7e-32cc3227fe08", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
18932024-10-09T22:51:48.330ZINFOtest_snapshot_expunge (nexus): updated firewall rules on 1 sleds
18942024-10-09T22:51:48.330ZTRACtest_snapshot_expunge (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18952024-10-09T22:51:48.331ZDEBGtest_snapshot_expunge (ServiceBalancer): roles roles = RoleSet { roles: {} }
18962024-10-09T22:51:48.332ZDEBGtest_snapshot_expunge (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18972024-10-09T22:51:48.332ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
18982024-10-09T22:51:48.332ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
18992024-10-09T22:51:48.332ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19002024-10-09T22:51:48.332ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19012024-10-09T22:51:48.335ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19022024-10-09T22:51:48.335ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
19032024-10-09T22:51:48.335ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
19042024-10-09T22:51:48.335ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
19052024-10-09T22:51:48.335ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
19062024-10-09T22:51:48.335ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19072024-10-09T22:51:48.335ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19082024-10-09T22:51:48.336ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19092024-10-09T22:51:48.336ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
19102024-10-09T22:51:48.336ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
19112024-10-09T22:51:48.336ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
19122024-10-09T22:51:48.336ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
19132024-10-09T22:51:48.336ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19142024-10-09T22:51:48.336ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19152024-10-09T22:51:48.336ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19162024-10-09T22:51:48.337ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19172024-10-09T22:51:48.337ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = inventory_collection iteration = 4 reason = Signaled
19182024-10-09T22:51:48.337ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
19192024-10-09T22:51:48.337ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19202024-10-09T22:51:48.337ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
19212024-10-09T22:51:48.337ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19222024-10-09T22:51:48.337ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
19232024-10-09T22:51:48.339ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 1a a4 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:51576 req_id = a47ab389-1266-4fb7-95b4-c428fab24877
19242024-10-09T22:51:48.339ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 6820,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51576 req_id = a47ab389-1266-4fb7-95b4-c428fab24877
19252024-10-09T22:51:48.339ZDEBGtest_snapshot_expunge (store): query key key = _nameservice._tcp
19262024-10-09T22:51:48.340ZDEBGtest_snapshot_expunge (store): query key key = 29559d11-f036-42f7-bc14-98a74e8ca0d9.host
19272024-10-09T22:51:48.340ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [Record { name_labels: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:51576 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55581, target: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal") })) }] req_id = a47ab389-1266-4fb7-95b4-c428fab24877
19282024-10-09T22:51:48.341ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: ce 9a 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:53103 req_id = 9336acb2-0b3d-4f9d-81bf-3576db3f915c
19292024-10-09T22:51:48.341ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 52890,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53103 req_id = 9336acb2-0b3d-4f9d-81bf-3576db3f915c
19302024-10-09T22:51:48.341ZDEBGtest_snapshot_expunge (store): query key key = _external-dns._tcp
19312024-10-09T22:51:48.341ZDEBGtest_snapshot_expunge (store): query key key = a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host
19322024-10-09T22:51:48.342ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [Record { name_labels: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:53103 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45535, target: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal") })) }] req_id = 9336acb2-0b3d-4f9d-81bf-3576db3f915c
19332024-10-09T22:51:48.342ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19342024-10-09T22:51:48.342ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19352024-10-09T22:51:48.342ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19362024-10-09T22:51:48.342ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19372024-10-09T22:51:48.343ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19382024-10-09T22:51:48.345ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19392024-10-09T22:51:48.345ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19402024-10-09T22:51:48.345ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19412024-10-09T22:51:48.345ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19422024-10-09T22:51:48.345ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19432024-10-09T22:51:48.346ZTRACtest_snapshot_expunge (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
19442024-10-09T22:51:48.346ZTRACtest_snapshot_expunge (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19452024-10-09T22:51:48.346ZTRACtest_snapshot_expunge (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
19462024-10-09T22:51:48.346ZDEBGtest_snapshot_expunge (ServiceBalancer): roles roles = RoleSet { roles: {} }
19472024-10-09T22:51:48.347ZDEBGtest_snapshot_expunge (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
19482024-10-09T22:51:48.348ZDEBGtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55581, target: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4970, tv_nsec: 178108987 } })
19492024-10-09T22:51:48.348ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
19502024-10-09T22:51:48.348ZDEBGtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 45535, target: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4970, tv_nsec: 178726618 } })
19512024-10-09T22:51:48.348ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
19522024-10-09T22:51:48.350ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19532024-10-09T22:51:48.355ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
19542024-10-09T22:51:48.356ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19552024-10-09T22:51:48.356ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19562024-10-09T22:51:48.356ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19572024-10-09T22:51:48.356ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19582024-10-09T22:51:48.362ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
19592024-10-09T22:51:48.362ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
19602024-10-09T22:51:48.362ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19612024-10-09T22:51:48.363ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
19622024-10-09T22:51:48.365ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 45 ad 01 00 00 01 00 00 00 00 00 01 24 32 39 35 E...........$295\n0010: 35 39 64 31 31 2d 66 30 33 36 2d 34 32 66 37 2d 59d11-f036-42f7-\n0020: 62 63 31 34 2d 39 38 61 37 34 65 38 63 61 30 64 bc14-98a74e8ca0d\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:58536 req_id = 552a7a7a-4d1a-4c85-98bf-c320c03d2046
19632024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 17837,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 50,\n 57,\n 53,\n 53,\n 57,\n 100,\n 49,\n 49,\n 45,\n 102,\n 48,\n 51,\n 54,\n 45,\n 52,\n 50,\n 102,\n 55,\n 45,\n 98,\n 99,\n 49,\n 52,\n 45,\n 57,\n 56,\n 97,\n 55,\n 52,\n 101,\n 56,\n 99,\n 97,\n 48,\n 100,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58536 req_id = 552a7a7a-4d1a-4c85-98bf-c320c03d2046
19642024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (store): query key key = 29559d11-f036-42f7-bc14-98a74e8ca0d9.host
19652024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:58536 query = LowerQuery { name: LowerName(Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal.")), original: Query { name: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("29559d11-f036-42f7-bc14-98a74e8ca0d9.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 552a7a7a-4d1a-4c85-98bf-c320c03d2046
19662024-10-09T22:51:48.365ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 5c 5e 01 00 00 01 00 00 00 00 00 01 24 61 35 63 \\^..........$a5c\n0010: 30 62 35 32 66 2d 66 33 63 33 2d 34 66 31 38 2d 0b52f-f3c3-4f18-\n0020: 61 30 61 63 2d 31 33 66 30 30 36 35 61 64 35 31 a0ac-13f0065ad51\n0030: 62 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 b.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:51793 req_id = e2183b41-5495-480c-b64b-6202c574c1ff
19672024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 23646,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 97,\n 53,\n 99,\n 48,\n 98,\n 53,\n 50,\n 102,\n 45,\n 102,\n 51,\n 99,\n 51,\n 45,\n 52,\n 102,\n 49,\n 56,\n 45,\n 97,\n 48,\n 97,\n 99,\n 45,\n 49,\n 51,\n 102,\n 48,\n 48,\n 54,\n 53,\n 97,\n 100,\n 53,\n 49,\n 98,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51793 req_id = e2183b41-5495-480c-b64b-6202c574c1ff
19682024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (store): query key key = a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host
19692024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:51793 query = LowerQuery { name: LowerName(Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal.")), original: Query { name: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = e2183b41-5495-480c-b64b-6202c574c1ff
19702024-10-09T22:51:48.365ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19712024-10-09T22:51:48.373ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19722024-10-09T22:51:48.373ZINFOtest_snapshot_expunge (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:55581] } background_task = dns_servers_internal dns_group = internal
19732024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 38.818445ms iteration = 2 status = {"addresses":["[::1]:55581"]}
19742024-10-09T22:51:48.374ZINFOtest_snapshot_expunge (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:45535] } background_task = dns_servers_external dns_group = external
19752024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 38.108859ms iteration = 2 status = {"addresses":["[::1]:45535"]}
19762024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
19772024-10-09T22:51:48.374ZWARNtest_snapshot_expunge (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
19782024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 27.649\u{b5}s iteration = 2 status = {"error":"no config"}
19792024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
19802024-10-09T22:51:48.374ZWARNtest_snapshot_expunge (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
19812024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 16.689\u{b5}s iteration = 2 status = {"error":"no config"}
19822024-10-09T22:51:48.374ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19832024-10-09T22:51:48.383ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19842024-10-09T22:51:48.384ZDEBGtest_snapshot_expunge (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19852024-10-09T22:51:48.399ZDEBGtest_snapshot_expunge (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
19862024-10-09T22:51:48.399ZINFOtest_snapshot_expunge (nexus): Rack initialized
19872024-10-09T22:51:48.399ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19882024-10-09T22:51:48.399ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
19892024-10-09T22:51:48.400ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19902024-10-09T22:51:48.401ZDEBGtest_snapshot_expunge (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
19912024-10-09T22:51:48.401ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
19922024-10-09T22:51:48.401ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
19932024-10-09T22:51:48.401ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19942024-10-09T22:51:48.401ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19952024-10-09T22:51:48.401ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19962024-10-09T22:51:48.401ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19972024-10-09T22:51:48.401ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19982024-10-09T22:51:48.401ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
19992024-10-09T22:51:48.402ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20002024-10-09T22:51:48.402ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20012024-10-09T22:51:48.402ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20022024-10-09T22:51:48.406ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20032024-10-09T22:51:48.407ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
20042024-10-09T22:51:48.407ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
20052024-10-09T22:51:48.410ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20062024-10-09T22:51:48.426ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20072024-10-09T22:51:48.426ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20082024-10-09T22:51:48.426ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20092024-10-09T22:51:48.427ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20102024-10-09T22:51:48.428ZDEBGtest_snapshot_expunge (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
20112024-10-09T22:51:48.428ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
20122024-10-09T22:51:48.428ZDEBGtest_snapshot_expunge (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
20132024-10-09T22:51:48.428ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
20142024-10-09T22:51:48.428ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20152024-10-09T22:51:48.428ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20162024-10-09T22:51:48.429ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20172024-10-09T22:51:48.429ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20182024-10-09T22:51:48.430ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20192024-10-09T22:51:48.443ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
20202024-10-09T22:51:48.443ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20212024-10-09T22:51:48.443ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20222024-10-09T22:51:48.444ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20232024-10-09T22:51:48.445ZDEBGtest_snapshot_expunge (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
20242024-10-09T22:51:48.445ZDEBGtest_snapshot_expunge (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = b7df6487-67ab-4b0e-94ca-c4974b14018a dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
20252024-10-09T22:51:48.445ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20262024-10-09T22:51:48.445ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20272024-10-09T22:51:48.446ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20282024-10-09T22:51:48.446ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20292024-10-09T22:51:48.446ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20302024-10-09T22:51:48.447ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20312024-10-09T22:51:48.470ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
20322024-10-09T22:51:48.471ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20332024-10-09T22:51:48.471ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20342024-10-09T22:51:48.471ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20352024-10-09T22:51:48.474ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20362024-10-09T22:51:48.474ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
20372024-10-09T22:51:48.474ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20382024-10-09T22:51:48.476ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 61 b1 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 a............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:56023 req_id = 0bd0a86f-ab41-4f1a-889e-beed714aae45
20392024-10-09T22:51:48.476ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 25009,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56023 req_id = 0bd0a86f-ab41-4f1a-889e-beed714aae45
20402024-10-09T22:51:48.476ZDEBGtest_snapshot_expunge (store): query key key = _mgs._tcp
20412024-10-09T22:51:48.477ZDEBGtest_snapshot_expunge (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
20422024-10-09T22:51:48.477ZDEBGtest_snapshot_expunge (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
20432024-10-09T22:51:48.477ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:56023 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43448, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 61986, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 0bd0a86f-ab41-4f1a-889e-beed714aae45
20442024-10-09T22:51:48.480ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20452024-10-09T22:51:48.498ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20462024-10-09T22:51:48.498ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20472024-10-09T22:51:48.499ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20482024-10-09T22:51:48.500ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20492024-10-09T22:51:48.500ZDEBGtest_snapshot_expunge (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
20502024-10-09T22:51:48.502ZDEBGtest_snapshot_expunge (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 6293f005-fe73-4646-8903-5ac43da19b23 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
20512024-10-09T22:51:48.502ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
20522024-10-09T22:51:48.503ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20532024-10-09T22:51:48.503ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20542024-10-09T22:51:48.503ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20552024-10-09T22:51:48.504ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20562024-10-09T22:51:48.510ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
20572024-10-09T22:51:48.511ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20582024-10-09T22:51:48.511ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20592024-10-09T22:51:48.511ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20602024-10-09T22:51:48.514ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20612024-10-09T22:51:48.518ZDEBGtest_snapshot_expunge (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = b7df6487-67ab-4b0e-94ca-c4974b14018a dns_zone_name = oxide-dev.test found_so_far = 1 version = 2
20622024-10-09T22:51:48.518ZDEBGtest_snapshot_expunge (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
20632024-10-09T22:51:48.518ZINFOtest_snapshot_expunge (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
20642024-10-09T22:51:48.519ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 183.92706ms iteration = 2 status = {"generation":2}
20652024-10-09T22:51:48.519ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
20662024-10-09T22:51:48.640ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:45535 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:45535] } uri = http://[::1]:45535/config
20672024-10-09T22:51:48.642ZINFOtest_snapshot_expunge (http): accepted connection kind = dns local_addr = [::1]:45535 remote_addr = [::1]:38645
20682024-10-09T22:51:48.643ZDEBGtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43448, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 61986, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4970, tv_nsec: 473301431 } })
20692024-10-09T22:51:48.643ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
20702024-10-09T22:51:48.643ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
20712024-10-09T22:51:48.647ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20722024-10-09T22:51:48.657ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
20732024-10-09T22:51:48.657ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20742024-10-09T22:51:48.657ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20752024-10-09T22:51:48.657ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20762024-10-09T22:51:48.658ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20772024-10-09T22:51:48.666ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
20782024-10-09T22:51:48.667ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20792024-10-09T22:51:48.667ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20802024-10-09T22:51:48.668ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20812024-10-09T22:51:48.670ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20822024-10-09T22:51:48.670ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
20832024-10-09T22:51:48.670ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20842024-10-09T22:51:48.673ZTRACtest_snapshot_expunge (http): incoming request kind = dns local_addr = [::1]:45535 method = PUT remote_addr = [::1]:38645 req_id = 1f2f96e9-99f1-475b-9052-a215b5d3b2ff uri = /config
20852024-10-09T22:51:48.673ZINFOtest_snapshot_expunge (store): attempting generation update new_generation = 2 req_id = 1f2f96e9-99f1-475b-9052-a215b5d3b2ff
20862024-10-09T22:51:48.673ZINFOtest_snapshot_expunge (store): pruning trees for generations newer than 0
20872024-10-09T22:51:48.673ZDEBGtest_snapshot_expunge (store): creating tree tree_name = generation_2_zone_oxide-dev.test
20882024-10-09T22:51:48.679ZDEBGtest_snapshot_expunge (store): updating current config
20892024-10-09T22:51:48.680ZDEBGtest_snapshot_expunge (store): flushing default tree
20902024-10-09T22:51:48.685ZINFOtest_snapshot_expunge (store): pruning trees for generations older than 2 keep = 3
20912024-10-09T22:51:48.685ZINFOtest_snapshot_expunge (store): updated generation new_generation = 2 req_id = 1f2f96e9-99f1-475b-9052-a215b5d3b2ff
20922024-10-09T22:51:48.685ZINFOtest_snapshot_expunge (http): request completed kind = dns latency_us = 13655 local_addr = [::1]:45535 method = PUT remote_addr = [::1]:38645 req_id = 1f2f96e9-99f1-475b-9052-a215b5d3b2ff response_code = 204 uri = /config
20932024-10-09T22:51:48.686ZDEBGtest_snapshot_expunge (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 6293f005-fe73-4646-8903-5ac43da19b23 dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
20942024-10-09T22:51:48.686ZDEBGtest_snapshot_expunge (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
20952024-10-09T22:51:48.686ZINFOtest_snapshot_expunge (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
20962024-10-09T22:51:48.686ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 354.012383ms iteration = 2 status = {"generation":1}
20972024-10-09T22:51:48.686ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
20982024-10-09T22:51:48.779ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:55581 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:55581] } uri = http://[::1]:55581/config
20992024-10-09T22:51:48.780ZINFOtest_snapshot_expunge (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2024-10-09T22:51:41.011130Z, time_modified: 2024-10-09T22:51:41.011130Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, db_silo: Silo { identity: SiloIdentity { id: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:51:47.501046Z, time_modified: 2024-10-09T22:51:47.501046Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, db_silo: Silo { identity: SiloIdentity { id: 38ae2f14-ff7c-4f61-bb90-9cd4697a8652, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:51:47.501046Z, time_modified: 2024-10-09T22:51:47.501046Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
21002024-10-09T22:51:48.780ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 444.283658ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"38ae2f14-ff7c-4f61-bb90-9cd4697a8652","tls_certs":[]}},"default_endpoint":{"silo_id":"38ae2f14-ff7c-4f61-bb90-9cd4697a8652","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 38ae2f14-ff7c-4f61-bb90-9cd4697a8652 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
21012024-10-09T22:51:48.783ZINFOtest_snapshot_expunge (http): accepted connection kind = dns local_addr = [::1]:55581 remote_addr = [::1]:47294
21022024-10-09T22:51:48.787ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 85 4c 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .L..........-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:49878 req_id = 7b6d9a92-18d3-4257-8c66-9388a6fc5b2c
21032024-10-09T22:51:48.787ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 34124,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:49878 req_id = 7b6d9a92-18d3-4257-8c66-9388a6fc5b2c
21042024-10-09T22:51:48.788ZDEBGtest_snapshot_expunge (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
21052024-10-09T22:51:48.789ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:49878 query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 7b6d9a92-18d3-4257-8c66-9388a6fc5b2c
21062024-10-09T22:51:48.789ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: ce 73 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .s..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:64622 req_id = a03a5f01-cb47-49c9-9752-7166fb8f7046
21072024-10-09T22:51:48.789ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 52851,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64622 req_id = a03a5f01-cb47-49c9-9752-7166fb8f7046
21082024-10-09T22:51:48.789ZDEBGtest_snapshot_expunge (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
21092024-10-09T22:51:48.789ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:64622 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = a03a5f01-cb47-49c9-9752-7166fb8f7046
21102024-10-09T22:51:48.789ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45535 generation = 2 result = Ok(Response { url: "http://[::1]:45535/config", status: 204, headers: {"x-request-id": "1f2f96e9-99f1-475b-9052-a215b5d3b2ff", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} }) servers = DnsServersList { addresses: [[::1]:45535] }
21112024-10-09T22:51:48.789ZINFOtest_snapshot_expunge (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:45535 generation = 2 servers = DnsServersList { addresses: [[::1]:45535] }
21122024-10-09T22:51:48.791ZINFOtest_snapshot_expunge (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:45535] }
21132024-10-09T22:51:48.791ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 272.077458ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:45535":{"Ok":null}}}
21142024-10-09T22:51:48.792ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21152024-10-09T22:51:48.793ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21162024-10-09T22:51:48.793ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21172024-10-09T22:51:48.793ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21182024-10-09T22:51:48.793ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21192024-10-09T22:51:48.961ZTRACtest_snapshot_expunge (DnsResolver): lookup_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
21202024-10-09T22:51:48.971ZTRACtest_snapshot_expunge (http): incoming request kind = dns local_addr = [::1]:55581 method = PUT remote_addr = [::1]:47294 req_id = 989a4f43-c41b-4082-92f0-726983a0fe09 uri = /config
21212024-10-09T22:51:48.975ZINFOtest_snapshot_expunge (store): attempting generation update new_generation = 1 req_id = 989a4f43-c41b-4082-92f0-726983a0fe09
21222024-10-09T22:51:48.975ZINFOtest_snapshot_expunge (store): updated generation new_generation = 1 req_id = 989a4f43-c41b-4082-92f0-726983a0fe09
21232024-10-09T22:51:48.976ZINFOtest_snapshot_expunge (http): request completed kind = dns latency_us = 14047 local_addr = [::1]:55581 method = PUT remote_addr = [::1]:47294 req_id = 989a4f43-c41b-4082-92f0-726983a0fe09 response_code = 204 uri = /config
21242024-10-09T22:51:48.982ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:55581 generation = 1 result = Ok(Response { url: "http://[::1]:55581/config", status: 204, headers: {"x-request-id": "989a4f43-c41b-4082-92f0-726983a0fe09", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} }) servers = DnsServersList { addresses: [[::1]:55581] }
21252024-10-09T22:51:48.982ZINFOtest_snapshot_expunge (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:55581 generation = 1 servers = DnsServersList { addresses: [[::1]:55581] }
21262024-10-09T22:51:48.983ZINFOtest_snapshot_expunge (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:55581] }
21272024-10-09T22:51:48.983ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 297.397308ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:55581":{"Ok":null}}}
21282024-10-09T22:51:48.987ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 75 d8 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c u............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:54196 req_id = 6b2c9186-d5e1-4534-b596-89833ef8c7a6
21292024-10-09T22:51:48.987ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30168,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54196 req_id = 6b2c9186-d5e1-4534-b596-89833ef8c7a6
21302024-10-09T22:51:48.987ZDEBGtest_snapshot_expunge (store): query key key = _clickhouse-admin-keeper._tcp
21312024-10-09T22:51:48.988ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 30168, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:54196 req_id = 6b2c9186-d5e1-4534-b596-89833ef8c7a6
21322024-10-09T22:51:48.988ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21332024-10-09T22:51:48.988ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21342024-10-09T22:51:48.988ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21352024-10-09T22:51:48.989ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21362024-10-09T22:51:48.992ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection background_task = inventory_collection
21372024-10-09T22:51:48.992ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:43448
21382024-10-09T22:51:48.993ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/ignition
21392024-10-09T22:51:49.011ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21402024-10-09T22:51:49.011ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21412024-10-09T22:51:49.011ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21422024-10-09T22:51:49.012ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21432024-10-09T22:51:49.020ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21442024-10-09T22:51:49.030ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21452024-10-09T22:51:49.030ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21462024-10-09T22:51:49.030ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21472024-10-09T22:51:49.030ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21482024-10-09T22:51:49.030ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21492024-10-09T22:51:49.030ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21502024-10-09T22:51:49.030ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21512024-10-09T22:51:49.033ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a868b37-5349-4641-b248-a0bb1da05b38", "content-length": "835", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21522024-10-09T22:51:49.034ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0
21532024-10-09T22:51:49.046ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21542024-10-09T22:51:49.046ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21552024-10-09T22:51:49.046ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21562024-10-09T22:51:49.047ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21572024-10-09T22:51:49.059ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21582024-10-09T22:51:49.059ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21592024-10-09T22:51:49.059ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21602024-10-09T22:51:49.060ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21612024-10-09T22:51:49.062ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2a520f5b-f64d-4495-bcf9-a433091a1337", "content-length": "734", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21622024-10-09T22:51:49.063ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=0
21632024-10-09T22:51:49.071ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21642024-10-09T22:51:49.079ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21652024-10-09T22:51:49.079ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21662024-10-09T22:51:49.079ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21672024-10-09T22:51:49.079ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21682024-10-09T22:51:49.082ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2ae328f1-cf94-461c-a2be-2c3f0eba40f9", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21692024-10-09T22:51:49.082ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=1
21702024-10-09T22:51:49.083ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21712024-10-09T22:51:49.083ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21722024-10-09T22:51:49.084ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21732024-10-09T22:51:49.086ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "dc0a3d63-e5cb-4cb7-9b3d-8cf8cc8e4180", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21742024-10-09T22:51:49.086ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=0
21752024-10-09T22:51:49.086ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21762024-10-09T22:51:49.086ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21772024-10-09T22:51:49.087ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21782024-10-09T22:51:49.089ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21792024-10-09T22:51:49.089ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21802024-10-09T22:51:49.090ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21812024-10-09T22:51:49.092ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "86bbf9bd-5bad-427f-8343-79931e73609f", "content-length": "167", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21822024-10-09T22:51:49.092ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=1
21832024-10-09T22:51:49.092ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21842024-10-09T22:51:49.092ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21852024-10-09T22:51:49.092ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21862024-10-09T22:51:49.092ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21872024-10-09T22:51:49.093ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21882024-10-09T22:51:49.095ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bf2746ad-199b-448d-8f54-5715e7a3857c", "content-length": "167", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
21892024-10-09T22:51:49.095ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/stage0/caboose?firmware_slot=0
21902024-10-09T22:51:49.095ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21912024-10-09T22:51:49.095ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21922024-10-09T22:51:49.095ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21932024-10-09T22:51:49.096ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21942024-10-09T22:51:49.110ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21952024-10-09T22:51:49.110ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21962024-10-09T22:51:49.110ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
21972024-10-09T22:51:49.111ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21982024-10-09T22:51:49.114ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21992024-10-09T22:51:49.130ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
22002024-10-09T22:51:49.130ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
22012024-10-09T22:51:49.130ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22022024-10-09T22:51:49.130ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22032024-10-09T22:51:49.131ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22042024-10-09T22:51:49.131ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "41a81ca7-7dfd-4710-9cc8-32c3e1a7bc66", "content-length": "175", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22052024-10-09T22:51:49.131ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/stage0/caboose?firmware_slot=1
22062024-10-09T22:51:49.136ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22072024-10-09T22:51:49.142ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22082024-10-09T22:51:49.144ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22092024-10-09T22:51:49.145ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bc7cab28-faaa-4340-84b4-e3728153931e", "content-length": "175", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22102024-10-09T22:51:49.172ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/cmpa
22112024-10-09T22:51:49.173ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22122024-10-09T22:51:49.173ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22132024-10-09T22:51:49.174ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22142024-10-09T22:51:49.186ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22152024-10-09T22:51:49.186ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22162024-10-09T22:51:49.188ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22172024-10-09T22:51:49.188ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f6f32370-d38c-4c49-999b-6792d54038b3", "content-length": "702", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22182024-10-09T22:51:49.188ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/cfpa
22192024-10-09T22:51:49.190ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "96be2b83-a97f-4ab5-9a62-698357bbc66d", "content-length": "727", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22202024-10-09T22:51:49.197ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/cfpa
22212024-10-09T22:51:49.197ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
22222024-10-09T22:51:49.197ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22232024-10-09T22:51:49.197ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22242024-10-09T22:51:49.197ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22252024-10-09T22:51:49.197ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22262024-10-09T22:51:49.198ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d1f3362-5f0c-4242-92f7-3be844d93a41", "content-length": "729", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22272024-10-09T22:51:49.199ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/cfpa
22282024-10-09T22:51:49.200ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ca32b9b3-2fc5-4e40-ae47-4077d8fb234a", "content-length": "728", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22292024-10-09T22:51:49.200ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1
22302024-10-09T22:51:49.200ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22312024-10-09T22:51:49.200ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22322024-10-09T22:51:49.200ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22332024-10-09T22:51:49.201ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22342024-10-09T22:51:49.203ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0630d712-a248-4d18-bd17-242a2a735631", "content-length": "734", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22352024-10-09T22:51:49.203ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/sp/caboose?firmware_slot=0
22362024-10-09T22:51:49.204ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22372024-10-09T22:51:49.204ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22382024-10-09T22:51:49.205ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22392024-10-09T22:51:49.206ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22402024-10-09T22:51:49.208ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22412024-10-09T22:51:49.234ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22422024-10-09T22:51:49.234ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22432024-10-09T22:51:49.234ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
22442024-10-09T22:51:49.234ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22452024-10-09T22:51:49.234ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22462024-10-09T22:51:49.234ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22472024-10-09T22:51:49.234ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22482024-10-09T22:51:49.241ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22492024-10-09T22:51:49.241ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22502024-10-09T22:51:49.241ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22512024-10-09T22:51:49.242ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22522024-10-09T22:51:49.242ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "67e7bf3c-a291-4966-87f8-324b5a53a310", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22532024-10-09T22:51:49.242ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/sp/caboose?firmware_slot=1
22542024-10-09T22:51:49.244ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22552024-10-09T22:51:49.244ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22562024-10-09T22:51:49.244ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22572024-10-09T22:51:49.245ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22582024-10-09T22:51:49.246ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22592024-10-09T22:51:49.257ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22602024-10-09T22:51:49.258ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22612024-10-09T22:51:49.258ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22622024-10-09T22:51:49.259ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22632024-10-09T22:51:49.259ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5835646b-c63d-4e97-9dd5-0f64bea52002", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22642024-10-09T22:51:49.260ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/caboose?firmware_slot=0
22652024-10-09T22:51:49.280ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22662024-10-09T22:51:49.280ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22672024-10-09T22:51:49.281ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22682024-10-09T22:51:49.283ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22692024-10-09T22:51:49.283ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22702024-10-09T22:51:49.284ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22712024-10-09T22:51:49.284ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5a6ab7dd-0327-467e-af48-f8a2f74b85b1", "content-length": "167", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22722024-10-09T22:51:49.285ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/caboose?firmware_slot=1
22732024-10-09T22:51:49.287ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22742024-10-09T22:51:49.287ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22752024-10-09T22:51:49.287ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22762024-10-09T22:51:49.291ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22772024-10-09T22:51:49.291ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22782024-10-09T22:51:49.291ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22792024-10-09T22:51:49.293ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22802024-10-09T22:51:49.293ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22812024-10-09T22:51:49.293ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22822024-10-09T22:51:49.293ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22832024-10-09T22:51:49.294ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22842024-10-09T22:51:49.294ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "47f08dac-07ca-48d0-831f-aff68ea239f7", "content-length": "167", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22852024-10-09T22:51:49.294ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/stage0/caboose?firmware_slot=0
22862024-10-09T22:51:49.296ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22872024-10-09T22:51:49.296ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22882024-10-09T22:51:49.296ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22892024-10-09T22:51:49.296ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22902024-10-09T22:51:49.298ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22912024-10-09T22:51:49.298ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22922024-10-09T22:51:49.298ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
22932024-10-09T22:51:49.299ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22942024-10-09T22:51:49.299ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a0cc8d2-6c67-4fce-bc1f-9639521dd291", "content-length": "175", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
22952024-10-09T22:51:49.299ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/stage0/caboose?firmware_slot=1
22962024-10-09T22:51:49.301ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22972024-10-09T22:51:49.310ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22982024-10-09T22:51:49.310ZTRACtest_snapshot_expunge (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22992024-10-09T22:51:49.310ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
23002024-10-09T22:51:49.310ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
23012024-10-09T22:51:49.310ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23022024-10-09T22:51:49.310ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23032024-10-09T22:51:49.311ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23042024-10-09T22:51:49.314ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
23052024-10-09T22:51:49.314ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23062024-10-09T22:51:49.314ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23072024-10-09T22:51:49.314ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23082024-10-09T22:51:49.315ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e314d4cd-2898-41ab-aa97-827366825464", "content-length": "175", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
23092024-10-09T22:51:49.315ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/cmpa
23102024-10-09T22:51:49.317ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e84f83a0-5042-40d0-a9b3-ba9f5b48948a", "content-length": "702", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
23112024-10-09T22:51:49.317ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/cfpa
23122024-10-09T22:51:49.317ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "58f74297-b109-4513-8adb-30f1537e71fe", "content-length": "727", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
23132024-10-09T22:51:49.317ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/cfpa
23142024-10-09T22:51:49.318ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5700b454-0e19-4607-b8e0-021d371cc844", "content-length": "729", "date": "Wed, 09 Oct 2024 22:51:48 GMT"} })
23152024-10-09T22:51:49.319ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/1/component/rot/cfpa
23162024-10-09T22:51:49.319ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23172024-10-09T22:51:49.319ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23182024-10-09T22:51:49.319ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23192024-10-09T22:51:49.319ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23202024-10-09T22:51:49.321ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23212024-10-09T22:51:49.332ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
23222024-10-09T22:51:49.332ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23232024-10-09T22:51:49.332ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23242024-10-09T22:51:49.333ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23252024-10-09T22:51:49.336ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "65649517-bc8d-40ee-ab29-69551b7f7f43", "content-length": "728", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
23262024-10-09T22:51:49.346ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0
23272024-10-09T22:51:49.366ZDEBGtest_snapshot_expunge (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: b785ab3a-dba9-4d64-85e0-f125ec7ad0e8, kind: Service { id: a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b }, name: Name("external-dns-a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: 828c7936-b8c2-46e1-b7cf-4e81712e58fa, kind: Service { id: f6fb5253-e555-4200-83a7-6591902f4bd5 }, name: Name("nexus-f6fb5253-e555-4200-83a7-6591902f4bd5"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
23282024-10-09T22:51:49.366ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
23292024-10-09T22:51:49.366ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23302024-10-09T22:51:49.366ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23312024-10-09T22:51:49.366ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23322024-10-09T22:51:49.367ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23332024-10-09T22:51:49.368ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0845244-e997-456d-9d67-c271fe054c30", "content-length": "723", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
23342024-10-09T22:51:49.368ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/sp/caboose?firmware_slot=0
23352024-10-09T22:51:49.412ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23362024-10-09T22:51:49.418ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
23372024-10-09T22:51:49.418ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23382024-10-09T22:51:49.418ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23392024-10-09T22:51:49.419ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23402024-10-09T22:51:49.422ZTRACtest_snapshot_expunge (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:51:47.816918Z, allowed_ips: None }
23412024-10-09T22:51:49.422ZDEBGtest_snapshot_expunge (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
23422024-10-09T22:51:49.423ZDEBGtest_snapshot_expunge (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b785ab3a-dba9-4d64-85e0-f125ec7ad0e8, kind: Service { id: a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b }, name: Name("external-dns-a5c0b52f-f3c3-4f18-a0ac-13f0065ad51b"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 828c7936-b8c2-46e1-b7cf-4e81712e58fa, kind: Service { id: f6fb5253-e555-4200-83a7-6591902f4bd5 }, name: Name("nexus-f6fb5253-e555-4200-83a7-6591902f4bd5"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
23432024-10-09T22:51:49.424ZDEBGtest_snapshot_expunge (InternalApi): resolved 2 rules for sleds
23442024-10-09T22:51:49.450ZDEBGtest_snapshot_expunge (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:51:43.040172Z, time_modified: 2024-10-09T22:51:43.040172Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(59608), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
23452024-10-09T22:51:49.450ZDEBGtest_snapshot_expunge (InternalApi): sending firewall rules to sled agents
23462024-10-09T22:51:49.450ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23472024-10-09T22:51:49.451ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23482024-10-09T22:51:49.463ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23492024-10-09T22:51:49.469ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9f911ab4-5f9c-45aa-a700-f276f9223c27", "content-length": "109", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
23502024-10-09T22:51:49.470ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/sp/caboose?firmware_slot=1
23512024-10-09T22:51:49.470ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
23522024-10-09T22:51:49.470ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23532024-10-09T22:51:49.471ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23542024-10-09T22:51:49.482ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
23552024-10-09T22:51:49.483ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23562024-10-09T22:51:49.501ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23572024-10-09T22:51:49.509ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
23582024-10-09T22:51:49.679ZDEBGtest_snapshot_expunge (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:59608/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23592024-10-09T22:51:49.697ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:56384 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23602024-10-09T22:51:49.707ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = PUT remote_addr = [::1]:56384 req_id = 387b0ffa-93a1-477c-8345-93d6c0a78037 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23612024-10-09T22:51:49.709ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 1165 local_addr = [::1]:59608 method = PUT remote_addr = [::1]:56384 req_id = 387b0ffa-93a1-477c-8345-93d6c0a78037 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23622024-10-09T22:51:49.718ZDEBGtest_snapshot_expunge (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:59608/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "387b0ffa-93a1-477c-8345-93d6c0a78037", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
23632024-10-09T22:51:49.720ZINFOtest_snapshot_expunge (InternalApi): updated firewall rules on 1 sleds
23642024-10-09T22:51:49.723ZINFOtest_snapshot_expunge (nexus): plumbed initial IP allowlist
23652024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /
23662024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /access
23672024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /assets/{path}
23682024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /device/auth
23692024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /device/confirm
23702024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /device/success
23712024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /device/token
23722024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /device/verify
23732024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /experimental/v1/probes
23742024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /experimental/v1/probes
23752024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /experimental/v1/probes/{probe}
23762024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /experimental/v1/probes/{probe}
23772024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /images
23782024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /login
23792024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /login/{silo_name}/local
23802024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /login/{silo_name}/saml/{provider_name}
23812024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /login/{silo_name}/saml/{provider_name}
23822024-10-09T22:51:49.793ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect
23832024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /lookup/{path}
23842024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /projects/{path}
23852024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /projects-new
23862024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /settings/{path}
23872024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /system/{path}
23882024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /utilization
23892024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/certificates
23902024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/certificates
23912024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/certificates/{certificate}
23922024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/certificates/{certificate}
23932024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/disks
23942024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/disks
23952024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/disks/{disk}
23962024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/disks/{disk}
23972024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/disks/{disk}/bulk-write
23982024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/disks/{disk}/bulk-write-start
23992024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/disks/{disk}/bulk-write-stop
24002024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/disks/{disk}/finalize
24012024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/disks/{disk}/metrics/{metric}
24022024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/floating-ips
24032024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/floating-ips
24042024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/floating-ips/{floating_ip}
24052024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/floating-ips/{floating_ip}
24062024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/floating-ips/{floating_ip}
24072024-10-09T22:51:49.794ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/floating-ips/{floating_ip}/attach
24082024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/floating-ips/{floating_ip}/detach
24092024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/groups
24102024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/groups/{group_id}
24112024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/images
24122024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/images
24132024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/images/{image}
24142024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/images/{image}
24152024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/images/{image}/demote
24162024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/images/{image}/promote
24172024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances
24182024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances
24192024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/instances/{instance}
24202024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}
24212024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/instances/{instance}
24222024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}/disks
24232024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/disks/attach
24242024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/disks/detach
24252024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}/external-ips
24262024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral
24272024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/external-ips/ephemeral
24282024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/reboot
24292024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}/serial-console
24302024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}/serial-console/stream
24312024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/instances/{instance}/ssh-public-keys
24322024-10-09T22:51:49.795ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/start
24332024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/instances/{instance}/stop
24342024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/internet-gateway-ip-addresses
24352024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/internet-gateway-ip-addresses
24362024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/internet-gateway-ip-addresses/{address}
24372024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/internet-gateway-ip-pools
24382024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/internet-gateway-ip-pools
24392024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/internet-gateway-ip-pools/{pool}
24402024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/internet-gateways
24412024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/internet-gateways
24422024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/internet-gateways/{gateway}
24432024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/internet-gateways/{gateway}
24442024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/ip-pools
24452024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/ip-pools/{pool}
24462024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/login/{silo_name}/local
24472024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/logout
24482024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/me
24492024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/me/groups
24502024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/me/ssh-keys
24512024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/me/ssh-keys
24522024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/me/ssh-keys/{ssh_key}
24532024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/me/ssh-keys/{ssh_key}
24542024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/metrics/{metric_name}
24552024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/network-interfaces
24562024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/network-interfaces
24572024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/network-interfaces/{interface}
24582024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/network-interfaces/{interface}
24592024-10-09T22:51:49.796ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/network-interfaces/{interface}
24602024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/ping
24612024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/policy
24622024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/policy
24632024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/projects
24642024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/projects
24652024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/projects/{project}
24662024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/projects/{project}
24672024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/projects/{project}
24682024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/projects/{project}/policy
24692024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/projects/{project}/policy
24702024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/snapshots
24712024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/snapshots
24722024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/snapshots/{snapshot}
24732024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/snapshots/{snapshot}
24742024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/disks
24752024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/disks/{disk_id}
24762024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/racks
24772024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/racks/{rack_id}
24782024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/sleds
24792024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/hardware/sleds
24802024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/sleds/{sled_id}
24812024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks
24822024-10-09T22:51:49.797ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances
24832024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy
24842024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/sleds-uninitialized
24852024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/switch-port
24862024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings
24872024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/hardware/switch-port/{port}/settings
24882024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/switch-port/{port}/status
24892024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/switches
24902024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/hardware/switches/{switch_id}
24912024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/identity-providers
24922024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/identity-providers/local/users
24932024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/identity-providers/local/users/{user_id}
24942024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password
24952024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/identity-providers/saml
24962024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/identity-providers/saml/{provider}
24972024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools
24982024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools
24992024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/ip-pools/{pool}
25002024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools/{pool}
25012024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/ip-pools/{pool}
25022024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools/{pool}/ranges
25032024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools/{pool}/ranges/add
25042024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove
25052024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools/{pool}/silos
25062024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools/{pool}/silos
25072024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo}
25082024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo}
25092024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools/{pool}/utilization
25102024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools-service
25112024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/ip-pools-service/ranges
25122024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools-service/ranges/add
25132024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/ip-pools-service/ranges/remove
25142024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/metrics/{metric_name}
25152024-10-09T22:51:49.798ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/address-lot
25162024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/address-lot
25172024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/networking/address-lot/{address_lot}
25182024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks
25192024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/allow-list
25202024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/networking/allow-list
25212024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/bfd-disable
25222024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/bfd-enable
25232024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bfd-status
25242024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/networking/bgp
25252024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp
25262024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/bgp
25272024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-announce-set
25282024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/networking/bgp-announce-set
25292024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set}
25302024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
25312024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-exported
25322024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-message-history
25332024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-routes-ipv4
25342024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/bgp-status
25352024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/loopback-address
25362024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/loopback-address
25372024-10-09T22:51:49.799ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
25382024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/networking/switch-port-settings
25392024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/switch-port-settings
25402024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/networking/switch-port-settings
25412024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/networking/switch-port-settings/{port}
25422024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/policy
25432024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/policy
25442024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/roles
25452024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/roles/{role_name}
25462024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silo-quotas
25472024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silos
25482024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/system/silos
25492024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/system/silos/{silo}
25502024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silos/{silo}
25512024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silos/{silo}/ip-pools
25522024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silos/{silo}/policy
25532024-10-09T22:51:49.800ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/silos/{silo}/policy
25542024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/silos/{silo}/quotas
25552024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/silos/{silo}/quotas
25562024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/system/update/repository
25572024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/update/repository/{system_version}
25582024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/users
25592024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/users/{user_id}
25602024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/users-builtin
25612024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/users-builtin/{user}
25622024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/utilization/silos
25632024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/system/utilization/silos/{silo}
25642024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/timeseries/query
25652024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/timeseries/schema
25662024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/users
25672024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/utilization
25682024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-firewall-rules
25692024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/vpc-firewall-rules
25702024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-router-routes
25712024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/vpc-router-routes
25722024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/vpc-router-routes/{route}
25732024-10-09T22:51:49.801ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-router-routes/{route}
25742024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/vpc-router-routes/{route}
25752024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-routers
25762024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/vpc-routers
25772024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/vpc-routers/{router}
25782024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-routers/{router}
25792024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/vpc-routers/{router}
25802024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-subnets
25812024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/vpc-subnets
25822024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/vpc-subnets/{subnet}
25832024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-subnets/{subnet}
25842024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/vpc-subnets/{subnet}
25852024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces
25862024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpcs
25872024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = POST path = /v1/vpcs
25882024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = DELETE path = /v1/vpcs/{vpc}
25892024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = GET path = /v1/vpcs/{vpc}
25902024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): registered endpoint local_addr = 127.0.0.1:59452 method = PUT path = /v1/vpcs/{vpc}
25912024-10-09T22:51:49.802ZINFOtest_snapshot_expunge (dropshot_external): listening local_addr = 127.0.0.1:59452
25922024-10-09T22:51:49.802ZDEBGtest_snapshot_expunge (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:59452
25932024-10-09T22:51:49.864ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /
25942024-10-09T22:51:49.864ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /access
25952024-10-09T22:51:49.864ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /assets/{path}
25962024-10-09T22:51:49.864ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /device/auth
25972024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /device/confirm
25982024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /device/success
25992024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /device/token
26002024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /device/verify
26012024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /experimental/v1/probes
26022024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /experimental/v1/probes
26032024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /experimental/v1/probes/{probe}
26042024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /experimental/v1/probes/{probe}
26052024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /images
26062024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /login
26072024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /login/{silo_name}/local
26082024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /login/{silo_name}/saml/{provider_name}
26092024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /login/{silo_name}/saml/{provider_name}
26102024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect
26112024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /lookup/{path}
26122024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /projects/{path}
26132024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /projects-new
26142024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /settings/{path}
26152024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /system/{path}
26162024-10-09T22:51:49.865ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /utilization
26172024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/certificates
26182024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/certificates
26192024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/certificates/{certificate}
26202024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/certificates/{certificate}
26212024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/disks
26222024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/disks
26232024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/disks/{disk}
26242024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/disks/{disk}
26252024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/disks/{disk}/bulk-write
26262024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/disks/{disk}/bulk-write-start
26272024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/disks/{disk}/bulk-write-stop
26282024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/disks/{disk}/finalize
26292024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/disks/{disk}/metrics/{metric}
26302024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/floating-ips
26312024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/floating-ips
26322024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/floating-ips/{floating_ip}
26332024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/floating-ips/{floating_ip}
26342024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/floating-ips/{floating_ip}
26352024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/floating-ips/{floating_ip}/attach
26362024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/floating-ips/{floating_ip}/detach
26372024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/groups
26382024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/groups/{group_id}
26392024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/images
26402024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/images
26412024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/images/{image}
26422024-10-09T22:51:49.866ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/images/{image}
26432024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/images/{image}/demote
26442024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/images/{image}/promote
26452024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances
26462024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances
26472024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/instances/{instance}
26482024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}
26492024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/instances/{instance}
26502024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}/disks
26512024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/disks/attach
26522024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/disks/detach
26532024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}/external-ips
26542024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral
26552024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/external-ips/ephemeral
26562024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/reboot
26572024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}/serial-console
26582024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}/serial-console/stream
26592024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/instances/{instance}/ssh-public-keys
26602024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/start
26612024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/instances/{instance}/stop
26622024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/internet-gateway-ip-addresses
26632024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/internet-gateway-ip-addresses
26642024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/internet-gateway-ip-addresses/{address}
26652024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/internet-gateway-ip-pools
26662024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/internet-gateway-ip-pools
26672024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/internet-gateway-ip-pools/{pool}
26682024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/internet-gateways
26692024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/internet-gateways
26702024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/internet-gateways/{gateway}
26712024-10-09T22:51:49.867ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/internet-gateways/{gateway}
26722024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/ip-pools
26732024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/ip-pools/{pool}
26742024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/login/{silo_name}/local
26752024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/logout
26762024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/me
26772024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/me/groups
26782024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/me/ssh-keys
26792024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/me/ssh-keys
26802024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/me/ssh-keys/{ssh_key}
26812024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/me/ssh-keys/{ssh_key}
26822024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/metrics/{metric_name}
26832024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/network-interfaces
26842024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/network-interfaces
26852024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/network-interfaces/{interface}
26862024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/network-interfaces/{interface}
26872024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/network-interfaces/{interface}
26882024-10-09T22:51:49.868ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/ping
26892024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/policy
26902024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/policy
26912024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/projects
26922024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/projects
26932024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/projects/{project}
26942024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/projects/{project}
26952024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/projects/{project}
26962024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/projects/{project}/policy
26972024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/projects/{project}/policy
26982024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/snapshots
26992024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/snapshots
27002024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/snapshots/{snapshot}
27012024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/snapshots/{snapshot}
27022024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/disks
27032024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/disks/{disk_id}
27042024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/racks
27052024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/racks/{rack_id}
27062024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/sleds
27072024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/hardware/sleds
27082024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/sleds/{sled_id}
27092024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks
27102024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances
27112024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy
27122024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/sleds-uninitialized
27132024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/switch-port
27142024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings
27152024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/hardware/switch-port/{port}/settings
27162024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/switch-port/{port}/status
27172024-10-09T22:51:49.869ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/switches
27182024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/hardware/switches/{switch_id}
27192024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/identity-providers
27202024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/identity-providers/local/users
27212024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/identity-providers/local/users/{user_id}
27222024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password
27232024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/identity-providers/saml
27242024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/identity-providers/saml/{provider}
27252024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools
27262024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools
27272024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/ip-pools/{pool}
27282024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools/{pool}
27292024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/ip-pools/{pool}
27302024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools/{pool}/ranges
27312024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools/{pool}/ranges/add
27322024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove
27332024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools/{pool}/silos
27342024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools/{pool}/silos
27352024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo}
27362024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo}
27372024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools/{pool}/utilization
27382024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools-service
27392024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/ip-pools-service/ranges
27402024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools-service/ranges/add
27412024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/ip-pools-service/ranges/remove
27422024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/metrics/{metric_name}
27432024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/address-lot
27442024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/address-lot
27452024-10-09T22:51:49.870ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/networking/address-lot/{address_lot}
27462024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks
27472024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/allow-list
27482024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/networking/allow-list
27492024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/bfd-disable
27502024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/bfd-enable
27512024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bfd-status
27522024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/networking/bgp
27532024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp
27542024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/bgp
27552024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-announce-set
27562024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/networking/bgp-announce-set
27572024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set}
27582024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
27592024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-exported
27602024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-message-history
27612024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-routes-ipv4
27622024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/bgp-status
27632024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/loopback-address
27642024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/loopback-address
27652024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
27662024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/networking/switch-port-settings
27672024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/switch-port-settings
27682024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/networking/switch-port-settings
27692024-10-09T22:51:49.871ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/networking/switch-port-settings/{port}
27702024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/policy
27712024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/policy
27722024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/roles
27732024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/roles/{role_name}
27742024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silo-quotas
27752024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silos
27762024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/system/silos
27772024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/system/silos/{silo}
27782024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silos/{silo}
27792024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silos/{silo}/ip-pools
27802024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silos/{silo}/policy
27812024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/silos/{silo}/policy
27822024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/silos/{silo}/quotas
27832024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/silos/{silo}/quotas
27842024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/system/update/repository
27852024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/update/repository/{system_version}
27862024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/users
27872024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/users/{user_id}
27882024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/users-builtin
27892024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/users-builtin/{user}
27902024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/utilization/silos
27912024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/system/utilization/silos/{silo}
27922024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/timeseries/query
27932024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/timeseries/schema
27942024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/users
27952024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/utilization
27962024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-firewall-rules
27972024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/vpc-firewall-rules
27982024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-router-routes
27992024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/vpc-router-routes
28002024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/vpc-router-routes/{route}
28012024-10-09T22:51:49.872ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-router-routes/{route}
28022024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/vpc-router-routes/{route}
28032024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-routers
28042024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/vpc-routers
28052024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/vpc-routers/{router}
28062024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-routers/{router}
28072024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/vpc-routers/{router}
28082024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-subnets
28092024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/vpc-subnets
28102024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/vpc-subnets/{subnet}
28112024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-subnets/{subnet}
28122024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/vpc-subnets/{subnet}
28132024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces
28142024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpcs
28152024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = POST path = /v1/vpcs
28162024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = DELETE path = /v1/vpcs/{vpc}
28172024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = GET path = /v1/vpcs/{vpc}
28182024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:56733 method = PUT path = /v1/vpcs/{vpc}
28192024-10-09T22:51:49.873ZINFOtest_snapshot_expunge (dropshot_external_techport): listening local_addr = 127.0.0.1:56733
28202024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:56733
28212024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (nexus-producer-server): registered DTrace probes
28222024-10-09T22:51:49.873ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = 127.0.0.1:57656 method = GET path = /{producer_id}
28232024-10-09T22:51:49.873ZINFOtest_snapshot_expunge (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197 local_addr = 127.0.0.1:57656
28242024-10-09T22:51:49.875ZDEBGtest_snapshot_expunge (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:57656
28252024-10-09T22:51:49.875ZDEBGtest_snapshot_expunge (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:57656
28262024-10-09T22:51:49.875ZDEBGtest_snapshot_expunge (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:46595
28272024-10-09T22:51:49.875ZDEBGtest_snapshot_expunge (nexus-producer-server): starting producer registration task
28282024-10-09T22:51:49.875ZINFOtest_snapshot_expunge (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:57656 file = oximeter/producer/src/lib.rs:283 interval = 10s producer_id = f6fb5253-e555-4200-83a7-6591902f4bd5
28292024-10-09T22:51:49.875ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28302024-10-09T22:51:49.875ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
28312024-10-09T22:51:49.876ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28322024-10-09T22:51:49.878ZDEBGtest_snapshot_expunge (producer-registration-task): registering / renewing oximeter producer lease with Nexus
28332024-10-09T22:51:49.878ZDEBGtest_snapshot_expunge (producer-registration-task): using nexus address for registration addr = 127.0.0.1:46595
28342024-10-09T22:51:49.966ZDEBGtest_snapshot_expunge (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46595/metrics/producers
28352024-10-09T22:51:49.971ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:34822
28362024-10-09T22:51:49.976ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
28372024-10-09T22:51:49.976ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28382024-10-09T22:51:49.976ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28392024-10-09T22:51:49.976ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
28402024-10-09T22:51:49.977ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28412024-10-09T22:51:49.978ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:34822 req_id = de8ab708-b5e4-41e3-b4aa-dae6f98bebd2 uri = /metrics/producers
28422024-10-09T22:51:49.984ZTRACtest_snapshot_expunge (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:34822 req_id = de8ab708-b5e4-41e3-b4aa-dae6f98bebd2 resource = Database uri = /metrics/producers
28432024-10-09T22:51:49.984ZDEBGtest_snapshot_expunge (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:34822 req_id = de8ab708-b5e4-41e3-b4aa-dae6f98bebd2 roles = RoleSet { roles: {} } uri = /metrics/producers
28442024-10-09T22:51:49.985ZDEBGtest_snapshot_expunge (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:34822 req_id = de8ab708-b5e4-41e3-b4aa-dae6f98bebd2 resource = Database result = Ok(()) uri = /metrics/producers
28452024-10-09T22:51:49.997ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28462024-10-09T22:51:50.009ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) } result = Ok(())
28472024-10-09T22:51:50.009ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
28482024-10-09T22:51:50.009ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28492024-10-09T22:51:50.009ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28502024-10-09T22:51:50.009ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
28512024-10-09T22:51:50.010ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28522024-10-09T22:51:50.041ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28532024-10-09T22:51:50.050ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) } result = Ok(())
28542024-10-09T22:51:50.050ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28552024-10-09T22:51:50.050ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
28562024-10-09T22:51:50.052ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28572024-10-09T22:51:50.060ZINFOtest_snapshot_expunge (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 80931 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:34822 req_id = de8ab708-b5e4-41e3-b4aa-dae6f98bebd2 response_code = 503 uri = /metrics/producers
28582024-10-09T22:51:50.064ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d5ecff06-68b4-4a7a-ac9b-6b7fd19a76de", "content-length": "109", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28592024-10-09T22:51:50.064ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/caboose?firmware_slot=0
28602024-10-09T22:51:50.065ZDEBGtest_snapshot_expunge (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46595/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "de8ab708-b5e4-41e3-b4aa-dae6f98bebd2", "content-length": "133", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28612024-10-09T22:51:50.068ZWARNtest_snapshot_expunge (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 340.056116ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"de8ab708-b5e4-41e3-b4aa-dae6f98bebd2\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:51:49 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"de8ab708-b5e4-41e3-b4aa-dae6f98bebd2\\" }" file = oximeter/producer/src/lib.rs:424
28622024-10-09T22:51:50.096ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0ef0b099-938c-4332-98d0-8649eb1c484d", "content-length": "169", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28632024-10-09T22:51:50.097ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/caboose?firmware_slot=1
28642024-10-09T22:51:50.099ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_oximeter
28652024-10-09T22:51:50.099ZDEBGtest_snapshot_expunge: Starting Oximeter
28662024-10-09T22:51:50.099ZDEBGtest_snapshot_expunge (oximeter): registered DTrace probes
28672024-10-09T22:51:50.100ZINFOtest_snapshot_expunge (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:203
28682024-10-09T22:51:50.100ZINFOtest_snapshot_expunge (DnsResolver): new DNS resolver addresses = [[::1:0:0:0:1]:53, [::2:0:0:0:1]:53, [::3:0:0:0:1]:53] file = internal-dns/src/resolver.rs:72
28692024-10-09T22:51:50.100ZDEBGtest_snapshot_expunge (oximeter): creating ClickHouse client
28702024-10-09T22:51:50.190ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = SELECT MAX(value) FROM oximeter.version;
28712024-10-09T22:51:50.196ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "421a7992-12e9-4ecb-88d2-1c8a0c646288", "content-length": "169", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28722024-10-09T22:51:50.196ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/stage0/caboose?firmware_slot=0
28732024-10-09T22:51:50.200ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "005211c3-8a4b-4b3b-8d39-7626bfdf3072", "content-length": "178", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28742024-10-09T22:51:50.201ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/stage0/caboose?firmware_slot=1
28752024-10-09T22:51:50.204ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "075c262a-0c6e-43c0-84e3-22412ae99d31", "content-length": "178", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28762024-10-09T22:51:50.205ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/cmpa
28772024-10-09T22:51:50.213ZWARNtest_snapshot_expunge (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:731 id = 284355d7-533b-4596-8545-b1f4382cd24d
28782024-10-09T22:51:50.213ZDEBGtest_snapshot_expunge (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
28792024-10-09T22:51:50.213ZINFOtest_snapshot_expunge (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:669 id = 284355d7-533b-4596-8545-b1f4382cd24d
28802024-10-09T22:51:50.213ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = SELECT MAX(value) FROM oximeter.version;
28812024-10-09T22:51:50.214ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cb8645a0-f23f-459b-add3-b3af54d4b22d", "content-length": "702", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28822024-10-09T22:51:50.214ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/cfpa
28832024-10-09T22:51:50.218ZWARNtest_snapshot_expunge (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:731 id = 284355d7-533b-4596-8545-b1f4382cd24d
28842024-10-09T22:51:50.219ZINFOtest_snapshot_expunge (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:673 id = 284355d7-533b-4596-8545-b1f4382cd24d version = 0
28852024-10-09T22:51:50.219ZINFOtest_snapshot_expunge (clickhouse-client): wiping and re-initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:678 id = 284355d7-533b-4596-8545-b1f4382cd24d
28862024-10-09T22:51:50.219ZDEBGtest_snapshot_expunge (clickhouse-client): wiping ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d
28872024-10-09T22:51:50.219ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = DROP DATABASE IF EXISTS oximeter
28882024-10-09T22:51:50.220ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a43c6ded-3acd-4a49-b896-4c9a0ef4f35e", "content-length": "727", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28892024-10-09T22:51:50.220ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/cfpa
28902024-10-09T22:51:50.221ZDEBGtest_snapshot_expunge (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d
28912024-10-09T22:51:50.221ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = CREATE DATABASE IF NOT EXISTS oximeter
28922024-10-09T22:51:50.222ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0dffa41b-fd30-4569-8e1e-ce45c4feba2f", "content-length": "729", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28932024-10-09T22:51:50.222ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/0/component/rot/cfpa
28942024-10-09T22:51:50.224ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fce7b728-a97c-428d-ada8-9bf344bc7c3a", "content-length": "728", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28952024-10-09T22:51:50.224ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1
28962024-10-09T22:51:50.225ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
28972024-10-09T22:51:50.228ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f6bd8654-4a9c-4485-b22b-5b3d7df12130", "content-length": "723", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
28982024-10-09T22:51:50.229ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/sp/caboose?firmware_slot=0
28992024-10-09T22:51:50.247ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29002024-10-09T22:51:50.249ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "25116581-3ebc-453f-964d-1769552e3c81", "content-length": "109", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29012024-10-09T22:51:50.249ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/sp/caboose?firmware_slot=1
29022024-10-09T22:51:50.251ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a01462f3-e2c1-4b5b-8919-f9e748025498", "content-length": "109", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29032024-10-09T22:51:50.251ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/caboose?firmware_slot=0
29042024-10-09T22:51:50.253ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8c83e4f4-cff4-4bcc-ba1e-ba875e34d075", "content-length": "169", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29052024-10-09T22:51:50.253ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/caboose?firmware_slot=1
29062024-10-09T22:51:50.254ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29072024-10-09T22:51:50.255ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3d8bc222-2bb8-403e-a7fe-a508d34f1961", "content-length": "169", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29082024-10-09T22:51:50.255ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/stage0/caboose?firmware_slot=0
29092024-10-09T22:51:50.257ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f873d7dc-457d-46da-9aa1-71ab04d52958", "content-length": "178", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29102024-10-09T22:51:50.257ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/stage0/caboose?firmware_slot=1
29112024-10-09T22:51:50.259ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "2005f637-4762-4393-a7d6-ff797fa56a90", "content-length": "178", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29122024-10-09T22:51:50.259ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/cmpa
29132024-10-09T22:51:50.260ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29142024-10-09T22:51:50.260ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6af667a7-8344-4310-bc5f-35537229916b", "content-length": "702", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29152024-10-09T22:51:50.261ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/cfpa
29162024-10-09T22:51:50.261ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f33cd255-b439-42e6-9455-60d2f43ccd7a", "content-length": "727", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29172024-10-09T22:51:50.262ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/cfpa
29182024-10-09T22:51:50.264ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "cc682b5f-f325-4110-8f23-b608acb60851", "content-length": "729", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29192024-10-09T22:51:50.264ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/sled/1/component/rot/cfpa
29202024-10-09T22:51:50.266ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29212024-10-09T22:51:50.267ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ab5678db-ccce-42ce-92f3-33421497c9c3", "content-length": "728", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29222024-10-09T22:51:50.267ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:61986
29232024-10-09T22:51:50.267ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:61986 method = GET uri = http://[::1]:61986/ignition
29242024-10-09T22:51:50.270ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:61986 result = Ok(Response { url: "http://[::1]:61986/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "465718a3-b370-4cd1-a7f1-dff5c9c48bb4", "content-length": "835", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29252024-10-09T22:51:50.270ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:61986 method = GET uri = http://[::1]:61986/sp/switch/0
29262024-10-09T22:51:50.271ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29272024-10-09T22:51:50.272ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:61986 result = Ok(Response { url: "http://[::1]:61986/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0cd01b1-7084-4e67-83c3-a70f3d2f2b6c", "content-length": "734", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29282024-10-09T22:51:50.272ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:61986 method = GET uri = http://[::1]:61986/sp/switch/1
29292024-10-09T22:51:50.274ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:61986 result = Ok(Response { url: "http://[::1]:61986/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7aeb10b-c826-4438-86e2-32efdcbd1277", "content-length": "734", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29302024-10-09T22:51:50.274ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:61986 method = GET uri = http://[::1]:61986/sp/sled/0
29312024-10-09T22:51:50.275ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:61986 result = Ok(Response { url: "http://[::1]:61986/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "32ca8f83-6123-491c-be12-608932927b3e", "content-length": "723", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29322024-10-09T22:51:50.275ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:61986 method = GET uri = http://[::1]:61986/sp/sled/1
29332024-10-09T22:51:50.276ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:61986 result = Ok(Response { url: "http://[::1]:61986/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8e8c7cf7-0a70-4be8-bebb-e776d1d042e2", "content-length": "723", "date": "Wed, 09 Oct 2024 22:51:49 GMT"} })
29342024-10-09T22:51:50.281ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
29352024-10-09T22:51:50.281ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29362024-10-09T22:51:50.281ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29372024-10-09T22:51:50.281ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29382024-10-09T22:51:50.282ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29392024-10-09T22:51:50.283ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29402024-10-09T22:51:50.285ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29412024-10-09T22:51:50.292ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29422024-10-09T22:51:50.292ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
29432024-10-09T22:51:50.292ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29442024-10-09T22:51:50.292ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29452024-10-09T22:51:50.292ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29462024-10-09T22:51:50.293ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29472024-10-09T22:51:50.293ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29482024-10-09T22:51:50.295ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29492024-10-09T22:51:50.299ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29502024-10-09T22:51:50.299ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29512024-10-09T22:51:50.299ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29522024-10-09T22:51:50.303ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29532024-10-09T22:51:50.303ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29542024-10-09T22:51:50.391ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:34518
29552024-10-09T22:51:50.391ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = http://[::1]:34518 background_task = inventory_collection body = None method = GET uri = http://[::1]:34518/inventory
29562024-10-09T22:51:50.391ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:34518 remote_addr = [::1]:65502 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
29572024-10-09T22:51:50.393ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29582024-10-09T22:51:50.393ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:34518 method = GET remote_addr = [::1]:65502 req_id = 76d45a53-9598-496d-95d2-c750161fa83a sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /inventory
29592024-10-09T22:51:50.395ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 2033 local_addr = [::1]:34518 method = GET remote_addr = [::1]:65502 req_id = 76d45a53-9598-496d-95d2-c750161fa83a response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /inventory
29602024-10-09T22:51:50.396ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = http://[::1]:34518 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:34518/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "76d45a53-9598-496d-95d2-c750161fa83a", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
29612024-10-09T22:51:50.397ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = http://[::1]:34518 background_task = inventory_collection body = None method = GET uri = http://[::1]:34518/omicron-zones
29622024-10-09T22:51:50.397ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:34518 method = GET remote_addr = [::1]:65502 req_id = 78fb0996-f3b0-4d1b-bee2-899d7d5f7092 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
29632024-10-09T22:51:50.398ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 165 local_addr = [::1]:34518 method = GET remote_addr = [::1]:65502 req_id = 78fb0996-f3b0-4d1b-bee2-899d7d5f7092 response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
29642024-10-09T22:51:50.398ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = http://[::1]:34518 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:34518/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "78fb0996-f3b0-4d1b-bee2-899d7d5f7092", "content-length": "27", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
29652024-10-09T22:51:50.505ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:59608
29662024-10-09T22:51:50.505ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = http://[::1]:59608 background_task = inventory_collection body = None method = GET uri = http://[::1]:59608/inventory
29672024-10-09T22:51:50.506ZINFOtest_snapshot_expunge (dropshot): accepted connection local_addr = [::1]:59608 remote_addr = [::1]:50999 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29682024-10-09T22:51:50.582ZDEBGtest_snapshot_expunge (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46595/metrics/producers
29692024-10-09T22:51:50.584ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29702024-10-09T22:51:50.585ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:62213
29712024-10-09T22:51:50.585ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = GET remote_addr = [::1]:50999 req_id = 42ada3f9-d219-4b33-99cd-9bb21c0291ef sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29722024-10-09T22:51:50.586ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 551 local_addr = [::1]:59608 method = GET remote_addr = [::1]:50999 req_id = 42ada3f9-d219-4b33-99cd-9bb21c0291ef response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29732024-10-09T22:51:50.586ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:62213 req_id = 2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8 uri = /metrics/producers
29742024-10-09T22:51:50.586ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = http://[::1]:59608 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:59608/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "42ada3f9-d219-4b33-99cd-9bb21c0291ef", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
29752024-10-09T22:51:50.587ZDEBGtest_snapshot_expunge (BackgroundTasks): client request SledAgent = http://[::1]:59608 background_task = inventory_collection body = None method = GET uri = http://[::1]:59608/omicron-zones
29762024-10-09T22:51:50.587ZTRACtest_snapshot_expunge (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:62213 req_id = 2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8 resource = Database uri = /metrics/producers
29772024-10-09T22:51:50.587ZDEBGtest_snapshot_expunge (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:62213 req_id = 2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8 roles = RoleSet { roles: {} } uri = /metrics/producers
29782024-10-09T22:51:50.588ZDEBGtest_snapshot_expunge (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:62213 req_id = 2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8 resource = Database result = Ok(()) uri = /metrics/producers
29792024-10-09T22:51:50.590ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:59608 method = GET remote_addr = [::1]:50999 req_id = c8446ad0-c97a-45a2-a455-f7662082b518 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
29802024-10-09T22:51:50.590ZINFOtest_snapshot_expunge (dropshot): request completed latency_us = 319 local_addr = [::1]:59608 method = GET remote_addr = [::1]:50999 req_id = c8446ad0-c97a-45a2-a455-f7662082b518 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
29812024-10-09T22:51:50.595ZDEBGtest_snapshot_expunge (BackgroundTasks): client response SledAgent = http://[::1]:59608 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:59608/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "c8446ad0-c97a-45a2-a455-f7662082b518", "content-length": "2268", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
29822024-10-09T22:51:50.598ZDEBGtest_snapshot_expunge (BackgroundTasks): finished collection background_task = inventory_collection
29832024-10-09T22:51:50.598ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
29842024-10-09T22:51:50.598ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29852024-10-09T22:51:50.598ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29862024-10-09T22:51:50.599ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29872024-10-09T22:51:50.599ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29882024-10-09T22:51:50.601ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29892024-10-09T22:51:50.603ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29902024-10-09T22:51:50.608ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
29912024-10-09T22:51:50.625ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29922024-10-09T22:51:50.625ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29932024-10-09T22:51:50.626ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29942024-10-09T22:51:50.630ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29952024-10-09T22:51:50.646ZINFOtest_snapshot_expunge (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 60098 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:62213 req_id = 2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8 response_code = 503 uri = /metrics/producers
29962024-10-09T22:51:50.648ZDEBGtest_snapshot_expunge (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46595/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8", "content-length": "133", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
29972024-10-09T22:51:50.650ZWARNtest_snapshot_expunge (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 517.537813ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:51:50 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"2f7ba4e9-03c6-4b48-9bcb-edee0b4978b8\\" }" file = oximeter/producer/src/lib.rs:424
29982024-10-09T22:51:50.652ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29992024-10-09T22:51:50.663ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30002024-10-09T22:51:50.691ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30012024-10-09T22:51:50.710ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30022024-10-09T22:51:50.736ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30032024-10-09T22:51:50.748ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30042024-10-09T22:51:50.761ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30052024-10-09T22:51:50.770ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30062024-10-09T22:51:50.777ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30072024-10-09T22:51:50.784ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30082024-10-09T22:51:50.792ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30092024-10-09T22:51:50.799ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30102024-10-09T22:51:50.807ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30112024-10-09T22:51:50.815ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30122024-10-09T22:51:50.824ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30132024-10-09T22:51:50.839ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30142024-10-09T22:51:50.847ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30152024-10-09T22:51:50.856ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30162024-10-09T22:51:50.863ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30172024-10-09T22:51:50.872ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30182024-10-09T22:51:50.881ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30192024-10-09T22:51:50.892ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30202024-10-09T22:51:50.899ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30212024-10-09T22:51:50.907ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30222024-10-09T22:51:50.917ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30232024-10-09T22:51:50.924ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30242024-10-09T22:51:50.932ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30252024-10-09T22:51:50.953ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
30262024-10-09T22:51:50.996ZINFOtest_snapshot_expunge (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:701 id = 284355d7-533b-4596-8545-b1f4382cd24d version = 12
30272024-10-09T22:51:50.996ZTRACtest_snapshot_expunge (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 284355d7-533b-4596-8545-b1f4382cd24d sql = INSERT INTO oximeter.version (*) VALUES (12, now());
30282024-10-09T22:51:51.016ZINFOtest_snapshot_expunge (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 28b1ecbf-5f6c-4c82-8def-04c4a7197cec
30292024-10-09T22:51:51.016ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 28b1ecbf-5f6c-4c82-8def-04c4a7197cec time_started = 2024-10-09 22:51:48.992213 UTC
30302024-10-09T22:51:51.016ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.679560929s iteration = 4 status = {"collection_id":"28b1ecbf-5f6c-4c82-8def-04c4a7197cec","time_done":"2024-10-09 22:51:50.598737 UTC","time_started":"2024-10-09 22:51:48.992213 UTC"}
30312024-10-09T22:51:51.016ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
30322024-10-09T22:51:51.016ZDEBGtest_snapshot_expunge (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 19.819\u{b5}s iteration = 2 status = {"error":"task disabled"}
30332024-10-09T22:51:51.020ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:37940 method = GET path = /info
30342024-10-09T22:51:51.020ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:37940 method = GET path = /producers
30352024-10-09T22:51:51.020ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:37940 method = POST path = /producers
30362024-10-09T22:51:51.020ZDEBGtest_snapshot_expunge (dropshot): registered endpoint local_addr = [::1]:37940 method = DELETE path = /producers/{producer_id}
30372024-10-09T22:51:51.021ZINFOtest_snapshot_expunge (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197 local_addr = [::1]:37940
30382024-10-09T22:51:51.021ZDEBGtest_snapshot_expunge (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:37940
30392024-10-09T22:51:51.022ZDEBGtest_snapshot_expunge (oximeter): contacting nexus
30402024-10-09T22:51:51.111ZDEBGtest_snapshot_expunge (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:46595/metrics/collectors
30412024-10-09T22:51:51.111ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:40873
30422024-10-09T22:51:51.112ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:40873 req_id = 2a537c06-8316-4b3e-b366-16db5829e809 uri = /metrics/collectors
30432024-10-09T22:51:51.112ZTRACtest_snapshot_expunge (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:40873 req_id = 2a537c06-8316-4b3e-b366-16db5829e809 resource = Database uri = /metrics/collectors
30442024-10-09T22:51:51.112ZDEBGtest_snapshot_expunge (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:40873 req_id = 2a537c06-8316-4b3e-b366-16db5829e809 roles = RoleSet { roles: {} } uri = /metrics/collectors
30452024-10-09T22:51:51.113ZDEBGtest_snapshot_expunge (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:40873 req_id = 2a537c06-8316-4b3e-b366-16db5829e809 resource = Database result = Ok(()) uri = /metrics/collectors
30462024-10-09T22:51:51.120ZINFOtest_snapshot_expunge (nexus): registered new oximeter metric collection server address = [::1]:37940 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30472024-10-09T22:51:51.120ZINFOtest_snapshot_expunge (dropshot_internal): request completed latency_us = 8469 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:40873 req_id = 2a537c06-8316-4b3e-b366-16db5829e809 response_code = 204 uri = /metrics/collectors
30482024-10-09T22:51:51.120ZDEBGtest_snapshot_expunge (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:46595/metrics/collectors", status: 204, headers: {"x-request-id": "2a537c06-8316-4b3e-b366-16db5829e809", "date": "Wed, 09 Oct 2024 22:51:50 GMT"} })
30492024-10-09T22:51:51.123ZINFOtest_snapshot_expunge (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:312 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30502024-10-09T22:51:51.123ZDEBGtest_snapshot_expunge (init_with_steps): Running step start_producer_server
30512024-10-09T22:51:51.123ZDEBGtest_snapshot_expunge: Starting test metric Producer Server
30522024-10-09T22:51:51.125ZINFOtest_snapshot_expunge: registering Oso class class = Action
30532024-10-09T22:51:51.125ZINFOtest_snapshot_expunge: registering Oso class class = AnyActor
30542024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = AuthenticatedActor
30552024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = BlueprintConfig
30562024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Database
30572024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = DnsConfig
30582024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Fleet
30592024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Inventory
30602024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = IpPoolList
30612024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = ConsoleSessionList
30622024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = DeviceAuthRequestList
30632024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = SiloCertificateList
30642024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = SiloIdentityProviderList
30652024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = SiloUserList
30662024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Project
30672024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Disk
30682024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Snapshot
30692024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = ProjectImage
30702024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Instance
30712024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = IpPool
30722024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = InstanceNetworkInterface
30732024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = Vpc
30742024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = VpcRouter
30752024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = InternetGateway
30762024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = InternetGatewayIpPool
30772024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = InternetGatewayIpAddress
30782024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = RouterRoute
30792024-10-09T22:51:51.126ZINFOtest_snapshot_expunge: registering Oso class class = VpcSubnet
30802024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = FloatingIp
30812024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Image
30822024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = SiloImage
30832024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = AddressLot
30842024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Blueprint
30852024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = LoopbackAddress
30862024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Certificate
30872024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = ConsoleSession
30882024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = DeviceAuthRequest
30892024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = DeviceAccessToken
30902024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = PhysicalDisk
30912024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Rack
30922024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = RoleBuiltin
30932024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = SshKey
30942024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Silo
30952024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = SiloUser
30962024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = SiloGroup
30972024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = IdentityProvider
30982024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = SamlIdentityProvider
30992024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Sled
31002024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = TufRepo
31012024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = TufArtifact
31022024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Zpool
31032024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = Service
31042024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: registering Oso class class = UserBuiltin
31052024-10-09T22:51:51.127ZINFOtest_snapshot_expunge: full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
31062024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31072024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31082024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31092024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31102024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31112024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31122024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31132024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31142024-10-09T22:51:51.159ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:57075 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31152024-10-09T22:51:51.159ZINFOtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:57075 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31162024-10-09T22:51:51.161ZDEBGtest_snapshot_expunge (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:57075 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31172024-10-09T22:51:51.161ZINFOtest_snapshot_expunge (SledAgent): Created Simulated Crucible Server address = [::1]:57075 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
31182024-10-09T22:51:51.161ZINFOtest_snapshot_expunge (nexus): upserting physical disk model = test-model physical_disk_id = 070e4b4d-e817-4611-a754-239edc8e57b6 serial = totally-unique-serial: 070e4b4d-e817-4611-a754-239edc8e57b6 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
31192024-10-09T22:51:51.161ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31202024-10-09T22:51:51.161ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31212024-10-09T22:51:51.163ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31222024-10-09T22:51:51.250ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:48244
31232024-10-09T22:51:51.250ZINFOtest_snapshot_expunge (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:770
31242024-10-09T22:51:51.250ZTRACtest_snapshot_expunge (DnsResolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
31252024-10-09T22:51:51.347ZDEBGtest_snapshot_expunge (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:46595/metrics/producers
31262024-10-09T22:51:51.348ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
31272024-10-09T22:51:51.348ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31282024-10-09T22:51:51.348ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31292024-10-09T22:51:51.348ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31302024-10-09T22:51:51.353ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31312024-10-09T22:51:51.354ZINFOtest_snapshot_expunge (dropshot_internal): accepted connection local_addr = 127.0.0.1:46595 remote_addr = 127.0.0.1:52640
31322024-10-09T22:51:51.356ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:48244 req_id = 0ac1edc7-4302-4670-993f-466c70544b96 uri = /metrics/producers
31332024-10-09T22:51:51.357ZTRACtest_snapshot_expunge (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:48244 req_id = 0ac1edc7-4302-4670-993f-466c70544b96 resource = Database uri = /metrics/producers
31342024-10-09T22:51:51.357ZDEBGtest_snapshot_expunge (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:48244 req_id = 0ac1edc7-4302-4670-993f-466c70544b96 roles = RoleSet { roles: {} } uri = /metrics/producers
31352024-10-09T22:51:51.358ZDEBGtest_snapshot_expunge (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:48244 req_id = 0ac1edc7-4302-4670-993f-466c70544b96 resource = Database result = Ok(()) uri = /metrics/producers
31362024-10-09T22:51:51.359ZTRACtest_snapshot_expunge (dropshot_internal): incoming request local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:52640 req_id = ff9577fe-13bf-4d86-8f48-978e6be5a8ae uri = /metrics/producers
31372024-10-09T22:51:51.360ZTRACtest_snapshot_expunge (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:52640 req_id = ff9577fe-13bf-4d86-8f48-978e6be5a8ae resource = Database uri = /metrics/producers
31382024-10-09T22:51:51.360ZDEBGtest_snapshot_expunge (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:52640 req_id = ff9577fe-13bf-4d86-8f48-978e6be5a8ae roles = RoleSet { roles: {} } uri = /metrics/producers
31392024-10-09T22:51:51.361ZDEBGtest_snapshot_expunge (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:52640 req_id = ff9577fe-13bf-4d86-8f48-978e6be5a8ae resource = Database result = Ok(()) uri = /metrics/producers
31402024-10-09T22:51:51.362ZWARNtest_snapshot_expunge (oximeter-agent): failed to lookup Nexus IP, will retry collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 delay = 148.382543ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/collector/src/agent.rs:834
31412024-10-09T22:51:51.364ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31422024-10-09T22:51:51.374ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
31432024-10-09T22:51:51.580ZINFOtest_snapshot_expunge (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
31442024-10-09T22:51:51.580ZDEBGtest_snapshot_expunge (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:37940/producers
31452024-10-09T22:51:51.692ZINFOtest_snapshot_expunge (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
31462024-10-09T22:51:51.695ZDEBGtest_snapshot_expunge (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:37940/producers
31472024-10-09T22:51:51.697ZINFOtest_snapshot_expunge (nexus): upserting zpool physical_disk_id = 070e4b4d-e817-4611-a754-239edc8e57b6 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = c04ccbb3-6d0d-48dc-a27c-85b9f551e4d7
31482024-10-09T22:51:51.697ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31492024-10-09T22:51:51.697ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31502024-10-09T22:51:51.700ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31512024-10-09T22:51:51.700ZINFOtest_snapshot_expunge (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105 local_addr = [::1]:37940 remote_addr = [::1]:36471
31522024-10-09T22:51:51.700ZINFOtest_snapshot_expunge (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105 local_addr = [::1]:37940 remote_addr = [::1]:46953
31532024-10-09T22:51:51.701ZTRACtest_snapshot_expunge (DnsResolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
31542024-10-09T22:51:51.704ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
31552024-10-09T22:51:51.704ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31562024-10-09T22:51:51.705ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31572024-10-09T22:51:51.705ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31582024-10-09T22:51:51.706ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31592024-10-09T22:51:51.711ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:37940 method = POST remote_addr = [::1]:36471 req_id = 0a7905ec-8936-497d-93c7-dafe0d774e4f uri = /producers
31602024-10-09T22:51:51.712ZTRACtest_snapshot_expunge (dropshot): incoming request local_addr = [::1]:37940 method = POST remote_addr = [::1]:46953 req_id = 1b9adeaa-10f2-47d1-b164-8d4ac8b19307 uri = /producers
31612024-10-09T22:51:51.715ZDEBGtest_snapshot_expunge (oximeter-agent): registered new metric producer address = [::1]:34544 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31622024-10-09T22:51:51.715ZDEBGtest_snapshot_expunge (oximeter-agent): registered new metric producer address = 127.0.0.1:57656 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = f6fb5253-e555-4200-83a7-6591902f4bd5
31632024-10-09T22:51:51.716ZINFOtest_snapshot_expunge (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950 latency_us = 4785 local_addr = [::1]:37940 method = POST remote_addr = [::1]:36471 req_id = 0a7905ec-8936-497d-93c7-dafe0d774e4f response_code = 204 uri = /producers
31642024-10-09T22:51:51.826ZINFOtest_snapshot_expunge (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950 latency_us = 114347 local_addr = [::1]:37940 method = POST remote_addr = [::1]:46953 req_id = 1b9adeaa-10f2-47d1-b164-8d4ac8b19307 response_code = 204 uri = /producers
31652024-10-09T22:51:51.944ZDEBGtest_snapshot_expunge (collection-task): starting oximeter collection task address = [::1]:34544 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 interval = 1s producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31662024-10-09T22:51:51.944ZDEBGtest_snapshot_expunge (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: "http://[::1]:37940/producers", status: 204, headers: {"x-request-id": "0a7905ec-8936-497d-93c7-dafe0d774e4f", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
31672024-10-09T22:51:51.944ZINFOtest_snapshot_expunge (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31682024-10-09T22:51:51.946ZDEBGtest_snapshot_expunge (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: "http://[::1]:37940/producers", status: 204, headers: {"x-request-id": "1b9adeaa-10f2-47d1-b164-8d4ac8b19307", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
31692024-10-09T22:51:51.946ZINFOtest_snapshot_expunge (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = f6fb5253-e555-4200-83a7-6591902f4bd5
31702024-10-09T22:51:51.958ZINFOtest_snapshot_expunge (dropshot_internal): request completed latency_us = 601424 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:48244 req_id = 0ac1edc7-4302-4670-993f-466c70544b96 response_code = 201 uri = /metrics/producers
31712024-10-09T22:51:51.958ZINFOtest_snapshot_expunge (dropshot_internal): request completed latency_us = 598477 local_addr = 127.0.0.1:46595 method = POST remote_addr = 127.0.0.1:52640 req_id = ff9577fe-13bf-4d86-8f48-978e6be5a8ae response_code = 201 uri = /metrics/producers
31722024-10-09T22:51:51.958ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31732024-10-09T22:51:51.962ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
31742024-10-09T22:51:51.981ZWARNtest_snapshot_expunge (oximeter-agent): failed to lookup Nexus IP, will retry collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 delay = 622.479268ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/collector/src/agent.rs:834
31752024-10-09T22:51:51.981ZDEBGtest_snapshot_expunge (collection-task): starting oximeter collection task address = 127.0.0.1:57656 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 interval = 10s producer_id = f6fb5253-e555-4200-83a7-6591902f4bd5
31762024-10-09T22:51:51.984ZDEBGtest_snapshot_expunge (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:46595/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "ff9577fe-13bf-4d86-8f48-978e6be5a8ae", "content-length": "41", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
31772024-10-09T22:51:51.986ZDEBGtest_snapshot_expunge (producer-registration-task): registered with nexus successfully
31782024-10-09T22:51:51.986ZDEBGtest_snapshot_expunge (producer-registration-task): pausing until time to renew lease lease_duration = 600s wait_period = 150s
31792024-10-09T22:51:52.012ZINFOtest_snapshot_expunge (nexus): upserting dataset address = [::1]:57075 dataset_id = 7f7710b3-2431-48a3-baad-7ab0ad2d7486 zpool_id = c04ccbb3-6d0d-48dc-a27c-85b9f551e4d7
31802024-10-09T22:51:52.100ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
31812024-10-09T22:51:52.102ZTRACtest_snapshot_expunge (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31822024-10-09T22:51:52.102ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31832024-10-09T22:51:52.102ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31842024-10-09T22:51:52.103ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31852024-10-09T22:51:52.104ZDEBGtest_snapshot_expunge (BackgroundTasks): activating background_task = inventory_collection iteration = 5 reason = Signaled
31862024-10-09T22:51:52.104ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
31872024-10-09T22:51:52.104ZTRACtest_snapshot_expunge (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31882024-10-09T22:51:52.104ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
31892024-10-09T22:51:52.104ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
31902024-10-09T22:51:52.105ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
31912024-10-09T22:51:52.110ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31922024-10-09T22:51:52.116ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
31932024-10-09T22:51:52.117ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31942024-10-09T22:51:52.117ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
31952024-10-09T22:51:52.117ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31962024-10-09T22:51:52.118ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31972024-10-09T22:51:52.122ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
31982024-10-09T22:51:52.122ZTRACtest_snapshot_expunge (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
31992024-10-09T22:51:52.122ZDEBGtest_snapshot_expunge (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
32002024-10-09T22:51:52.123ZDEBGtest_snapshot_expunge (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
32012024-10-09T22:51:52.124ZTRACtest_snapshot_expunge (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
32022024-10-09T22:51:52.125ZTRACtest_snapshot_expunge (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
32032024-10-09T22:51:52.125ZDEBGtest_snapshot_expunge (InternalApi): roles roles = RoleSet { roles: {} }
32042024-10-09T22:51:52.126ZDEBGtest_snapshot_expunge (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
32052024-10-09T22:51:52.126ZDEBGtest_snapshot_expunge (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(28b1ecbf-5f6c-4c82-8def-04c4a7197cec, 0)]
32062024-10-09T22:51:52.126ZTRACtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
32072024-10-09T22:51:52.130ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 8c 98 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:63030 req_id = 5458b9c0-ec1c-439b-b206-4ddaf7da6de9
32082024-10-09T22:51:52.130ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 35992,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63030 req_id = 5458b9c0-ec1c-439b-b206-4ddaf7da6de9
32092024-10-09T22:51:52.130ZDEBGtest_snapshot_expunge (store): query key key = _mgs._tcp
32102024-10-09T22:51:52.131ZDEBGtest_snapshot_expunge (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
32112024-10-09T22:51:52.131ZDEBGtest_snapshot_expunge (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
32122024-10-09T22:51:52.131ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63030 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43448, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 61986, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 5458b9c0-ec1c-439b-b206-4ddaf7da6de9
32132024-10-09T22:51:52.138ZDEBGtest_snapshot_expunge (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 43448, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 61986, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4973, tv_nsec: 968274713 } })
32142024-10-09T22:51:52.138ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
32152024-10-09T22:51:52.138ZTRACtest_snapshot_expunge (DnsResolver): lookup_service_targets: looking up SRV target
32162024-10-09T22:51:52.139ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: c1 13 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:59445 req_id = c1ba0049-2cac-4420-9498-755b4d66a14d
32172024-10-09T22:51:52.139ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49427,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59445 req_id = c1ba0049-2cac-4420-9498-755b4d66a14d
32182024-10-09T22:51:52.139ZDEBGtest_snapshot_expunge (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
32192024-10-09T22:51:52.139ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:59445 query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = c1ba0049-2cac-4420-9498-755b4d66a14d
32202024-10-09T22:51:52.139ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 34 d7 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e 4...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:50433 req_id = be164e45-5c7d-4d59-a9e9-b58a9b743384
32212024-10-09T22:51:52.140ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 13527,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50433 req_id = be164e45-5c7d-4d59-a9e9-b58a9b743384
32222024-10-09T22:51:52.140ZDEBGtest_snapshot_expunge (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
32232024-10-09T22:51:52.140ZDEBGtest_snapshot_expunge (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:50433 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = be164e45-5c7d-4d59-a9e9-b58a9b743384
32242024-10-09T22:51:52.319ZTRACtest_snapshot_expunge (DnsResolver): lookup_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
32252024-10-09T22:51:52.320ZTRACtest_snapshot_expunge (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: ee 92 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c ............._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:50871 req_id = e2f9187b-d682-4b7a-bcdd-609bde6d1c3a
32262024-10-09T22:51:52.320ZDEBGtest_snapshot_expunge (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 61074,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50871 req_id = e2f9187b-d682-4b7a-bcdd-609bde6d1c3a
32272024-10-09T22:51:52.323ZDEBGtest_snapshot_expunge (store): query key key = _clickhouse-admin-keeper._tcp
32282024-10-09T22:51:52.323ZERROtest_snapshot_expunge (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 61074, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:50871 req_id = e2f9187b-d682-4b7a-bcdd-609bde6d1c3a
32292024-10-09T22:51:52.324ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection background_task = inventory_collection
32302024-10-09T22:51:52.324ZDEBGtest_snapshot_expunge (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:43448
32312024-10-09T22:51:52.324ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/ignition
32322024-10-09T22:51:52.326ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "1fc02aeb-2339-4377-9267-441262f925fb", "content-length": "835", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
32332024-10-09T22:51:52.326ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0
32342024-10-09T22:51:52.327ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "97dc866f-6b15-449c-9e7b-46767d739f85", "content-length": "734", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
32352024-10-09T22:51:52.328ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=0
32362024-10-09T22:51:52.349ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a0b8722e-4a67-4685-aad3-2dfb5ae89ac2", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
32372024-10-09T22:51:52.349ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=1
32382024-10-09T22:51:52.362ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f3ab0b42-3195-4141-aee4-6fd921d67a51", "content-length": "111", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
32392024-10-09T22:51:52.362ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=0
32402024-10-09T22:51:52.396ZDEBGtest_snapshot_expunge (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:43448 result = Ok(Response { url: "http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a1dbbeb0-0b63-4533-8d93-00425d78e392", "content-length": "167", "date": "Wed, 09 Oct 2024 22:51:51 GMT"} })
32412024-10-09T22:51:52.397ZDEBGtest_snapshot_expunge (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:43448 method = GET uri = http://[::1]:43448/sp/switch/0/component/rot/caboose?firmware_slot=1
32422024-10-09T22:51:52.440ZDEBGtest_snapshot_expunge: attempt to fetch latest inventory collection result = Err(InternalError { internal_message: "unexpected database error: query `SELECT \\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\", \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\", \\"inv_clickhouse_keeper_membership\\".\\"leader_committed_log_index\\", \\"inv_clickhouse_keeper_membership\\".\\"raft_config\\" FROM \\"inv_clickhouse_keeper_membership\\" WHERE (\\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\" = $1) ORDER BY \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\" ASC LIMIT $2` contains a full table/index scan which is explicitly disallowed" })