1 | 2024-10-09T22:52:02.345Z | DEBG | test_utilization (init_with_steps): Running step start_crdb
|
2 | 2024-10-09T22:52:02.362Z | DEBG | test_utilization: Starting CRDB
|
3 | 2024-10-09T22:52:02.456Z | INFO | test_utilization: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpVNU4kh
|
4 | 2024-10-09T22:52:02.456Z | INFO | test_utilization: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar) to storage directory (/var/tmp/omicron_tmp/.tmpVNU4kh/data)
|
5 | 2024-10-09T22:52:02.489Z | INFO | test_utilization: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpVNU4kh/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpVNU4kh/listen-url
|
6 | 2024-10-09T22:52:02.490Z | INFO | test_utilization: cockroach environment: BUILDOMAT_JOB_ID=01J9SJYMATCRAF4F3QS7FBKSKS BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar GITHUB_BRANCH=clickhouse-inventory-collection GITHUB_REF=refs/heads/clickhouse-inventory-collection GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=632346210ca646c818d7aa831a111e033a94b92c GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib NEXTEST_RUN_ID=b2c3cc9f-c5f1-4193-a632-20d8708574c8 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-9dedaa07c0981ee9/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.80.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1 __NEXTEST_ORIGINAL_CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus
|
7 | 2024-10-09T22:52:05.235Z | INFO | test_utilization: cockroach pid: 19990
|
8 | 2024-10-09T22:52:05.235Z | INFO | test_utilization: cockroach listen URL: postgresql://root@[::1]:61746/omicron?sslmode=disable
|
9 | 2024-10-09T22:52:05.235Z | DEBG | test_utilization (init_with_steps): Running step start_clickhouse
|
10 | 2024-10-09T22:52:05.236Z | DEBG | test_utilization: Starting Clickhouse
|
11 | 2024-10-09T22:52:05.944Z | DEBG | test_utilization (init_with_steps): Running step start_gateway_switch0
|
12 | 2024-10-09T22:52:05.944Z | DEBG | test_utilization: Starting Management Gateway
|
13 | 2024-10-09T22:52:06.073Z | DEBG | test_utilization (init_with_steps): Running step start_gateway_switch1
|
14 | 2024-10-09T22:52:06.073Z | DEBG | test_utilization: Starting Management Gateway
|
15 | 2024-10-09T22:52:06.196Z | DEBG | test_utilization (init_with_steps): Running step start_dendrite_switch0
|
16 | 2024-10-09T22:52:06.196Z | DEBG | test_utilization: Starting Dendrite for switch0
|
17 | 2024-10-09T22:52:06.267Z | DEBG | test_utilization (init_with_steps): Running step start_dendrite_switch1
|
18 | 2024-10-09T22:52:06.267Z | DEBG | test_utilization: Starting Dendrite for switch1
|
19 | 2024-10-09T22:52:06.316Z | DEBG | test_utilization (init_with_steps): Running step start_mgd_switch0
|
20 | 2024-10-09T22:52:06.316Z | DEBG | test_utilization: Starting mgd for switch0
|
21 | 2024-10-09T22:52:06.463Z | DEBG | test_utilization: mgd port is 51362
|
22 | 2024-10-09T22:52:06.463Z | DEBG | test_utilization (init_with_steps): Running step start_mgd_switch1
|
23 | 2024-10-09T22:52:06.463Z | DEBG | test_utilization: Starting mgd for switch1
|
24 | 2024-10-09T22:52:06.543Z | DEBG | test_utilization: mgd port is 49698
|
25 | 2024-10-09T22:52:06.543Z | DEBG | test_utilization (init_with_steps): Running step record_switch_dns
|
26 | 2024-10-09T22:52:06.543Z | DEBG | test_utilization: Recording DNS for the switch zones
|
27 | 2024-10-09T22:52:06.543Z | DEBG | test_utilization (init_with_steps): Running step start_internal_dns
|
28 | 2024-10-09T22:52:06.543Z | INFO | test_utilization (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpSM0Epr
|
29 | 2024-10-09T22:52:06.786Z | INFO | test_utilization (store): pruning trees for generations newer than 0
|
30 | 2024-10-09T22:52:06.809Z | INFO | test_utilization (store): pruning trees for generations older than 0
keep = 3
|
31 | 2024-10-09T22:52:06.809Z | INFO | test_utilization (dns): DNS server bound to address
kind = dns
local_address = [::1]:39358
|
32 | 2024-10-09T22:52:06.810Z | DEBG | test_utilization (http): registered endpoint
kind = dns
local_addr = [::1]:37132
method = GET
path = /config
|
33 | 2024-10-09T22:52:06.810Z | DEBG | test_utilization (http): registered endpoint
kind = dns
local_addr = [::1]:37132
method = PUT
path = /config
|
34 | 2024-10-09T22:52:06.810Z | INFO | test_utilization (http): listening
kind = dns
local_addr = [::1]:37132
|
35 | 2024-10-09T22:52:06.811Z | DEBG | test_utilization (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:37132
|
36 | 2024-10-09T22:52:06.811Z | DEBG | test_utilization (init_with_steps): Running step start_external_dns
|
37 | 2024-10-09T22:52:06.811Z | INFO | test_utilization (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpaEsJY7
|
38 | 2024-10-09T22:52:06.851Z | INFO | test_utilization (store): pruning trees for generations newer than 0
|
39 | 2024-10-09T22:52:06.851Z | INFO | test_utilization (store): pruning trees for generations older than 0
keep = 3
|
40 | 2024-10-09T22:52:06.851Z | INFO | test_utilization (dns): DNS server bound to address
kind = dns
local_address = [::1]:64187
|
41 | 2024-10-09T22:52:06.851Z | DEBG | test_utilization (http): registered endpoint
kind = dns
local_addr = [::1]:53582
method = GET
path = /config
|
42 | 2024-10-09T22:52:06.851Z | DEBG | test_utilization (http): registered endpoint
kind = dns
local_addr = [::1]:53582
method = PUT
path = /config
|
43 | 2024-10-09T22:52:06.851Z | INFO | test_utilization (http): listening
kind = dns
local_addr = [::1]:53582
|
44 | 2024-10-09T22:52:06.852Z | DEBG | test_utilization (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:53582
|
45 | 2024-10-09T22:52:06.852Z | DEBG | test_utilization (init_with_steps): Running step start_nexus_internal
|
46 | 2024-10-09T22:52:06.852Z | DEBG | test_utilization: Starting Nexus (internal API)
|
47 | 2024-10-09T22:52:06.852Z | INFO | test_utilization: setting up nexus server
|
48 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = Action
|
49 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = AnyActor
|
50 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = AuthenticatedActor
|
51 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = BlueprintConfig
|
52 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = Database
|
53 | 2024-10-09T22:52:06.854Z | INFO | test_utilization (ServerContext): registering Oso class
class = DnsConfig
|
54 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Fleet
|
55 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Inventory
|
56 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = IpPoolList
|
57 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = ConsoleSessionList
|
58 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = DeviceAuthRequestList
|
59 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloCertificateList
|
60 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloIdentityProviderList
|
61 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloUserList
|
62 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Project
|
63 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Disk
|
64 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Snapshot
|
65 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = ProjectImage
|
66 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Instance
|
67 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = IpPool
|
68 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = InstanceNetworkInterface
|
69 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = Vpc
|
70 | 2024-10-09T22:52:06.855Z | INFO | test_utilization (ServerContext): registering Oso class
class = VpcRouter
|
71 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = InternetGateway
|
72 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = InternetGatewayIpPool
|
73 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = InternetGatewayIpAddress
|
74 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = RouterRoute
|
75 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = VpcSubnet
|
76 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = FloatingIp
|
77 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Image
|
78 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloImage
|
79 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = AddressLot
|
80 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Blueprint
|
81 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = LoopbackAddress
|
82 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Certificate
|
83 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = ConsoleSession
|
84 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = DeviceAuthRequest
|
85 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = DeviceAccessToken
|
86 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = PhysicalDisk
|
87 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Rack
|
88 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = RoleBuiltin
|
89 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = SshKey
|
90 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Silo
|
91 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloUser
|
92 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = SiloGroup
|
93 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = IdentityProvider
|
94 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = SamlIdentityProvider
|
95 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = Sled
|
96 | 2024-10-09T22:52:06.856Z | INFO | test_utilization (ServerContext): registering Oso class
class = TufRepo
|
97 | 2024-10-09T22:52:06.857Z | INFO | test_utilization (ServerContext): registering Oso class
class = TufArtifact
|
98 | 2024-10-09T22:52:06.857Z | INFO | test_utilization (ServerContext): registering Oso class
class = Zpool
|
99 | 2024-10-09T22:52:06.857Z | INFO | test_utilization (ServerContext): registering Oso class
class = Service
|
100 | 2024-10-09T22:52:06.857Z | INFO | test_utilization (ServerContext): registering Oso class
class = UserBuiltin
|
101 | 2024-10-09T22:52:06.857Z | INFO | test_utilization (ServerContext): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
102 | 2024-10-09T22:52:06.911Z | INFO | test_utilization (ServerContext): Setting up resolver using DNS address: [::1]:39358
|
103 | 2024-10-09T22:52:06.911Z | INFO | test_utilization (DnsResolver): new DNS resolver
addresses = [[::1]:39358]
|
104 | 2024-10-09T22:52:06.912Z | INFO | test_utilization (ServerContext): Setting up qorb pool from a single host
url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:61746/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 61746,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n },\n}
|
105 | 2024-10-09T22:52:07.011Z | INFO | test_utilization (nexus): Database schema version is up to date
desired_version = 109.0.0
found_version = 109.0.0
|
106 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /artifacts/{kind}/{name}/{version}
|
107 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /bgtasks
|
108 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /bgtasks/activate
|
109 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /bgtasks/view/{bgtask_name}
|
110 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
|
111 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
|
112 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
|
113 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-finish
|
114 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-start
|
115 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /demo-saga
|
116 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /demo-saga/{demo_saga_id}/complete
|
117 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /deployment/blueprints/all
|
118 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = DELETE
path = /deployment/blueprints/all/{blueprint_id}
|
119 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /deployment/blueprints/all/{blueprint_id}
|
120 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /deployment/blueprints/import
|
121 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /deployment/blueprints/regenerate
|
122 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /deployment/blueprints/target
|
123 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /deployment/blueprints/target
|
124 | 2024-10-09T22:52:07.679Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = PUT
path = /deployment/blueprints/target/enabled
|
125 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /disk/{disk_id}/remove-read-only-parent
|
126 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = PUT
path = /disks/{disk_id}
|
127 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /instances/{instance_id}/migrate
|
128 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /metrics/collectors
|
129 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /metrics/collectors/{collector_id}/producers
|
130 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /metrics/producers
|
131 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /nat/ipv4/changeset/{from_gen}
|
132 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /physical-disk/expunge
|
133 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /probes/{sled}
|
134 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = PUT
path = /racks/{rack_id}/initialization-complete
|
135 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /sagas
|
136 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /sagas/{saga_id}
|
137 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /sled-agents/{sled_id}
|
138 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /sled-agents/{sled_id}
|
139 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /sled-agents/{sled_id}/firewall-rules-update
|
140 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /sleds/add
|
141 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /sleds/expunge
|
142 | 2024-10-09T22:52:07.680Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = GET
path = /sleds/uninitialized
|
143 | 2024-10-09T22:52:07.681Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = PUT
path = /switch/{switch_id}
|
144 | 2024-10-09T22:52:07.681Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = PUT
path = /vmms/{propolis_id}
|
145 | 2024-10-09T22:52:07.681Z | DEBG | test_utilization (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:52787
method = POST
path = /volume/{volume_id}/remove-read-only-parent
|
146 | 2024-10-09T22:52:07.681Z | INFO | test_utilization (dropshot_internal): listening
local_addr = 127.0.0.1:52787
|
147 | 2024-10-09T22:52:07.681Z | DEBG | test_utilization (dropshot_internal): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:52787
|
148 | 2024-10-09T22:52:07.681Z | INFO | test_utilization (SEC): SEC running
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
149 | 2024-10-09T22:52:07.681Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
150 | 2024-10-09T22:52:07.681Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
151 | 2024-10-09T22:52:07.685Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
152 | 2024-10-09T22:52:07.685Z | DEBG | test_utilization (DataLoader): attempting to create built-in users
|
153 | 2024-10-09T22:52:07.686Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
154 | 2024-10-09T22:52:07.686Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
155 | 2024-10-09T22:52:07.687Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
156 | 2024-10-09T22:52:07.707Z | INFO | test_utilization (DataLoader): created 5 built-in users
|
157 | 2024-10-09T22:52:07.707Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
158 | 2024-10-09T22:52:07.708Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
159 | 2024-10-09T22:52:07.711Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
160 | 2024-10-09T22:52:07.711Z | DEBG | test_utilization (DataLoader): attempting to create built-in roles
|
161 | 2024-10-09T22:52:07.711Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
162 | 2024-10-09T22:52:07.711Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
163 | 2024-10-09T22:52:07.712Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
164 | 2024-10-09T22:52:07.726Z | INFO | test_utilization (DataLoader): created 10 built-in roles
|
165 | 2024-10-09T22:52:07.726Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
166 | 2024-10-09T22:52:07.726Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
167 | 2024-10-09T22:52:07.728Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
168 | 2024-10-09T22:52:07.728Z | DEBG | test_utilization (DataLoader): attempting to create built-in role assignments
|
169 | 2024-10-09T22:52:07.728Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
170 | 2024-10-09T22:52:07.728Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
171 | 2024-10-09T22:52:07.729Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
172 | 2024-10-09T22:52:08.143Z | INFO | test_utilization (DataLoader): created 4 built-in role assignments
|
173 | 2024-10-09T22:52:08.143Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
174 | 2024-10-09T22:52:08.143Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
175 | 2024-10-09T22:52:08.155Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
176 | 2024-10-09T22:52:08.161Z | DEBG | test_utilization (DataLoader): attempting to create built-in silos
|
177 | 2024-10-09T22:52:08.166Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
178 | 2024-10-09T22:52:08.166Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
179 | 2024-10-09T22:52:08.167Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
180 | 2024-10-09T22:52:08.334Z | INFO | test_utilization (DataLoader): created 2 built-in silos
|
181 | 2024-10-09T22:52:08.334Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
182 | 2024-10-09T22:52:08.334Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
183 | 2024-10-09T22:52:08.335Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
184 | 2024-10-09T22:52:08.379Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
185 | 2024-10-09T22:52:08.379Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
186 | 2024-10-09T22:52:08.384Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
187 | 2024-10-09T22:52:08.384Z | DEBG | test_utilization (DataLoader): attempting to create built-in projects
|
188 | 2024-10-09T22:52:08.384Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
189 | 2024-10-09T22:52:08.384Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
190 | 2024-10-09T22:52:08.385Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
191 | 2024-10-09T22:52:08.479Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
192 | 2024-10-09T22:52:08.479Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
193 | 2024-10-09T22:52:08.479Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
194 | 2024-10-09T22:52:08.479Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
195 | 2024-10-09T22:52:08.480Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
196 | 2024-10-09T22:52:08.489Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
197 | 2024-10-09T22:52:08.497Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
198 | 2024-10-09T22:52:08.498Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
199 | 2024-10-09T22:52:08.499Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
200 | 2024-10-09T22:52:08.549Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
201 | 2024-10-09T22:52:08.553Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
202 | 2024-10-09T22:52:08.553Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
203 | 2024-10-09T22:52:08.553Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
204 | 2024-10-09T22:52:08.553Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
205 | 2024-10-09T22:52:08.553Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
206 | 2024-10-09T22:52:08.553Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
207 | 2024-10-09T22:52:08.556Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
208 | 2024-10-09T22:52:08.556Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
209 | 2024-10-09T22:52:08.556Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
210 | 2024-10-09T22:52:08.556Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
211 | 2024-10-09T22:52:08.558Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
212 | 2024-10-09T22:52:08.561Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
213 | 2024-10-09T22:52:08.561Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
214 | 2024-10-09T22:52:08.561Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
215 | 2024-10-09T22:52:08.562Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
216 | 2024-10-09T22:52:08.607Z | INFO | test_utilization (DataLoader): created built-in services project
|
217 | 2024-10-09T22:52:08.607Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
218 | 2024-10-09T22:52:08.607Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
219 | 2024-10-09T22:52:08.610Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
220 | 2024-10-09T22:52:08.610Z | DEBG | test_utilization (DataLoader): attempting to create built-in VPCs
|
221 | 2024-10-09T22:52:08.610Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
222 | 2024-10-09T22:52:08.610Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
223 | 2024-10-09T22:52:08.611Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
224 | 2024-10-09T22:52:08.620Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
225 | 2024-10-09T22:52:08.620Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
226 | 2024-10-09T22:52:08.621Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
227 | 2024-10-09T22:52:08.625Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
228 | 2024-10-09T22:52:08.625Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
229 | 2024-10-09T22:52:08.625Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
230 | 2024-10-09T22:52:08.625Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
231 | 2024-10-09T22:52:08.626Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
232 | 2024-10-09T22:52:08.628Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
233 | 2024-10-09T22:52:08.628Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
234 | 2024-10-09T22:52:08.628Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
235 | 2024-10-09T22:52:08.629Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
236 | 2024-10-09T22:52:08.630Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
237 | 2024-10-09T22:52:08.630Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
238 | 2024-10-09T22:52:08.630Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
239 | 2024-10-09T22:52:08.631Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
240 | 2024-10-09T22:52:08.633Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
241 | 2024-10-09T22:52:08.639Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
242 | 2024-10-09T22:52:08.639Z | TRAC | test_utilization (DataLoader): successful lookup of siloed resource "Project" using built-in user
|
243 | 2024-10-09T22:52:08.639Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
244 | 2024-10-09T22:52:08.639Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
245 | 2024-10-09T22:52:08.639Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
246 | 2024-10-09T22:52:08.639Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
247 | 2024-10-09T22:52:08.640Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
248 | 2024-10-09T22:52:08.642Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
249 | 2024-10-09T22:52:08.642Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
250 | 2024-10-09T22:52:08.642Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
251 | 2024-10-09T22:52:08.643Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
252 | 2024-10-09T22:52:08.644Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
253 | 2024-10-09T22:52:08.645Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
254 | 2024-10-09T22:52:08.645Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
255 | 2024-10-09T22:52:08.646Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
256 | 2024-10-09T22:52:08.648Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
257 | 2024-10-09T22:52:08.665Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
258 | 2024-10-09T22:52:08.665Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
259 | 2024-10-09T22:52:08.665Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
260 | 2024-10-09T22:52:08.666Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
261 | 2024-10-09T22:52:08.698Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
262 | 2024-10-09T22:52:08.698Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
263 | 2024-10-09T22:52:08.698Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
264 | 2024-10-09T22:52:08.698Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
265 | 2024-10-09T22:52:08.699Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
266 | 2024-10-09T22:52:08.708Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
267 | 2024-10-09T22:52:08.708Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
268 | 2024-10-09T22:52:08.708Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
269 | 2024-10-09T22:52:08.715Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
270 | 2024-10-09T22:52:08.801Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
271 | 2024-10-09T22:52:08.801Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
272 | 2024-10-09T22:52:08.801Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
273 | 2024-10-09T22:52:08.802Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
274 | 2024-10-09T22:52:08.834Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
275 | 2024-10-09T22:52:08.843Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
276 | 2024-10-09T22:52:08.843Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
277 | 2024-10-09T22:52:08.843Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
278 | 2024-10-09T22:52:08.844Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
279 | 2024-10-09T22:52:08.880Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
280 | 2024-10-09T22:52:08.882Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
281 | 2024-10-09T22:52:08.883Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
282 | 2024-10-09T22:52:08.914Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
283 | 2024-10-09T22:52:08.914Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
284 | 2024-10-09T22:52:08.914Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
285 | 2024-10-09T22:52:08.929Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
286 | 2024-10-09T22:52:08.929Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
287 | 2024-10-09T22:52:08.929Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
288 | 2024-10-09T22:52:08.929Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
289 | 2024-10-09T22:52:08.930Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
290 | 2024-10-09T22:52:08.933Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
291 | 2024-10-09T22:52:08.933Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
292 | 2024-10-09T22:52:08.933Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
293 | 2024-10-09T22:52:08.935Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
294 | 2024-10-09T22:52:08.946Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
295 | 2024-10-09T22:52:08.947Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
296 | 2024-10-09T22:52:08.947Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
297 | 2024-10-09T22:52:08.947Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
298 | 2024-10-09T22:52:09.002Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
299 | 2024-10-09T22:52:09.014Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
300 | 2024-10-09T22:52:09.014Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
301 | 2024-10-09T22:52:09.020Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
302 | 2024-10-09T22:52:09.028Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
303 | 2024-10-09T22:52:09.105Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
304 | 2024-10-09T22:52:09.106Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
305 | 2024-10-09T22:52:09.106Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
306 | 2024-10-09T22:52:09.106Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
307 | 2024-10-09T22:52:09.107Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
308 | 2024-10-09T22:52:09.120Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
309 | 2024-10-09T22:52:09.120Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
310 | 2024-10-09T22:52:09.120Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
311 | 2024-10-09T22:52:09.121Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
312 | 2024-10-09T22:52:09.133Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
313 | 2024-10-09T22:52:09.133Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
314 | 2024-10-09T22:52:09.133Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
315 | 2024-10-09T22:52:09.134Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
316 | 2024-10-09T22:52:09.137Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
317 | 2024-10-09T22:52:09.148Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
318 | 2024-10-09T22:52:09.148Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
319 | 2024-10-09T22:52:09.148Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
320 | 2024-10-09T22:52:09.149Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
321 | 2024-10-09T22:52:09.248Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
322 | 2024-10-09T22:52:09.248Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
323 | 2024-10-09T22:52:09.248Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
324 | 2024-10-09T22:52:09.248Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
325 | 2024-10-09T22:52:09.249Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
326 | 2024-10-09T22:52:09.252Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
327 | 2024-10-09T22:52:09.252Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
328 | 2024-10-09T22:52:09.252Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
329 | 2024-10-09T22:52:09.253Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
330 | 2024-10-09T22:52:09.260Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
331 | 2024-10-09T22:52:09.266Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
332 | 2024-10-09T22:52:09.269Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
333 | 2024-10-09T22:52:09.290Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
334 | 2024-10-09T22:52:09.365Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
335 | 2024-10-09T22:52:09.374Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
336 | 2024-10-09T22:52:09.375Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
337 | 2024-10-09T22:52:09.375Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
338 | 2024-10-09T22:52:09.375Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
339 | 2024-10-09T22:52:09.383Z | DEBG | test_utilization (DataLoader): attempting to create built-in VPC firewall rules
|
340 | 2024-10-09T22:52:09.384Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
341 | 2024-10-09T22:52:09.384Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
342 | 2024-10-09T22:52:09.385Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
343 | 2024-10-09T22:52:09.387Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
344 | 2024-10-09T22:52:09.388Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
345 | 2024-10-09T22:52:09.388Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
346 | 2024-10-09T22:52:09.390Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
347 | 2024-10-09T22:52:09.390Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
348 | 2024-10-09T22:52:09.435Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
349 | 2024-10-09T22:52:09.437Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
350 | 2024-10-09T22:52:09.437Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
351 | 2024-10-09T22:52:09.437Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
352 | 2024-10-09T22:52:09.437Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
353 | 2024-10-09T22:52:09.438Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
354 | 2024-10-09T22:52:09.440Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
355 | 2024-10-09T22:52:09.440Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
356 | 2024-10-09T22:52:09.440Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
357 | 2024-10-09T22:52:09.440Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
358 | 2024-10-09T22:52:09.444Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
359 | 2024-10-09T22:52:09.444Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
360 | 2024-10-09T22:52:09.444Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
361 | 2024-10-09T22:52:09.444Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
362 | 2024-10-09T22:52:09.446Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
363 | 2024-10-09T22:52:09.452Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
364 | 2024-10-09T22:52:09.452Z | TRAC | test_utilization (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
365 | 2024-10-09T22:52:09.452Z | TRAC | test_utilization (DataLoader): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
366 | 2024-10-09T22:52:09.452Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
367 | 2024-10-09T22:52:09.452Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
368 | 2024-10-09T22:52:09.452Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
369 | 2024-10-09T22:52:09.453Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
370 | 2024-10-09T22:52:09.454Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
371 | 2024-10-09T22:52:09.454Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
372 | 2024-10-09T22:52:09.454Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
373 | 2024-10-09T22:52:09.474Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
374 | 2024-10-09T22:52:09.485Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
375 | 2024-10-09T22:52:09.485Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
376 | 2024-10-09T22:52:09.485Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
377 | 2024-10-09T22:52:09.486Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
378 | 2024-10-09T22:52:09.496Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
379 | 2024-10-09T22:52:09.506Z | DEBG | test_utilization (DataLoader): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
380 | 2024-10-09T22:52:09.506Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
381 | 2024-10-09T22:52:09.506Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
382 | 2024-10-09T22:52:09.507Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
383 | 2024-10-09T22:52:09.542Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
384 | 2024-10-09T22:52:09.542Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
385 | 2024-10-09T22:52:09.542Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
386 | 2024-10-09T22:52:09.542Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
387 | 2024-10-09T22:52:09.543Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
388 | 2024-10-09T22:52:09.545Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
389 | 2024-10-09T22:52:09.545Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
390 | 2024-10-09T22:52:09.547Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
391 | 2024-10-09T22:52:09.547Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
392 | 2024-10-09T22:52:09.548Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
393 | 2024-10-09T22:52:09.548Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
394 | 2024-10-09T22:52:09.548Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
395 | 2024-10-09T22:52:09.548Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
396 | 2024-10-09T22:52:09.550Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
397 | 2024-10-09T22:52:09.556Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
398 | 2024-10-09T22:52:09.557Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
399 | 2024-10-09T22:52:09.557Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
400 | 2024-10-09T22:52:09.557Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
401 | 2024-10-09T22:52:09.696Z | INFO | test_utilization (DataLoader): created built-in VPC firewall rules
|
402 | 2024-10-09T22:52:09.696Z | DEBG | test_utilization (DataLoader): attempting to create built-in VPC Subnets
|
403 | 2024-10-09T22:52:09.696Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
404 | 2024-10-09T22:52:09.696Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
405 | 2024-10-09T22:52:09.697Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
406 | 2024-10-09T22:52:09.716Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
407 | 2024-10-09T22:52:09.716Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
408 | 2024-10-09T22:52:09.717Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
409 | 2024-10-09T22:52:09.719Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
410 | 2024-10-09T22:52:09.719Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
411 | 2024-10-09T22:52:09.720Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
412 | 2024-10-09T22:52:09.721Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
413 | 2024-10-09T22:52:09.721Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
414 | 2024-10-09T22:52:09.722Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
415 | 2024-10-09T22:52:09.722Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
416 | 2024-10-09T22:52:09.722Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
417 | 2024-10-09T22:52:09.724Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
418 | 2024-10-09T22:52:09.724Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
419 | 2024-10-09T22:52:09.724Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
420 | 2024-10-09T22:52:09.725Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
421 | 2024-10-09T22:52:09.727Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
422 | 2024-10-09T22:52:09.727Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
423 | 2024-10-09T22:52:09.727Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
424 | 2024-10-09T22:52:09.728Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
425 | 2024-10-09T22:52:09.729Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
426 | 2024-10-09T22:52:09.736Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
427 | 2024-10-09T22:52:09.737Z | TRAC | test_utilization (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
428 | 2024-10-09T22:52:09.737Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
429 | 2024-10-09T22:52:09.737Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
430 | 2024-10-09T22:52:09.737Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
431 | 2024-10-09T22:52:09.745Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
432 | 2024-10-09T22:52:09.745Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
433 | 2024-10-09T22:52:09.745Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
434 | 2024-10-09T22:52:09.745Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
435 | 2024-10-09T22:52:09.746Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
436 | 2024-10-09T22:52:09.748Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
437 | 2024-10-09T22:52:09.748Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
438 | 2024-10-09T22:52:09.748Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
439 | 2024-10-09T22:52:09.749Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
440 | 2024-10-09T22:52:09.750Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
441 | 2024-10-09T22:52:09.750Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
442 | 2024-10-09T22:52:09.750Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
443 | 2024-10-09T22:52:09.751Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
444 | 2024-10-09T22:52:09.753Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
445 | 2024-10-09T22:52:09.759Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
446 | 2024-10-09T22:52:09.770Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
447 | 2024-10-09T22:52:09.770Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
448 | 2024-10-09T22:52:09.771Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
449 | 2024-10-09T22:52:09.908Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
450 | 2024-10-09T22:52:09.908Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
451 | 2024-10-09T22:52:09.909Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
452 | 2024-10-09T22:52:09.917Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
453 | 2024-10-09T22:52:09.917Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
454 | 2024-10-09T22:52:09.917Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
455 | 2024-10-09T22:52:09.917Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
456 | 2024-10-09T22:52:09.918Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
457 | 2024-10-09T22:52:09.973Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
458 | 2024-10-09T22:52:09.973Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
459 | 2024-10-09T22:52:09.975Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
460 | 2024-10-09T22:52:09.976Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
461 | 2024-10-09T22:52:10.003Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
462 | 2024-10-09T22:52:10.003Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
463 | 2024-10-09T22:52:10.003Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
464 | 2024-10-09T22:52:10.003Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
465 | 2024-10-09T22:52:10.012Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
466 | 2024-10-09T22:52:10.035Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
467 | 2024-10-09T22:52:10.035Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
468 | 2024-10-09T22:52:10.035Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
469 | 2024-10-09T22:52:10.036Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
470 | 2024-10-09T22:52:10.101Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
471 | 2024-10-09T22:52:10.101Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
472 | 2024-10-09T22:52:10.102Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
473 | 2024-10-09T22:52:10.126Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
474 | 2024-10-09T22:52:10.126Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
475 | 2024-10-09T22:52:10.126Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
476 | 2024-10-09T22:52:10.126Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
477 | 2024-10-09T22:52:10.127Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
478 | 2024-10-09T22:52:10.140Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
479 | 2024-10-09T22:52:10.140Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
480 | 2024-10-09T22:52:10.140Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
481 | 2024-10-09T22:52:10.141Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
482 | 2024-10-09T22:52:10.162Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
483 | 2024-10-09T22:52:10.162Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
484 | 2024-10-09T22:52:10.162Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
485 | 2024-10-09T22:52:10.163Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
486 | 2024-10-09T22:52:10.174Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
487 | 2024-10-09T22:52:10.181Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
488 | 2024-10-09T22:52:10.222Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
489 | 2024-10-09T22:52:10.222Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
490 | 2024-10-09T22:52:10.223Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
491 | 2024-10-09T22:52:10.352Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
492 | 2024-10-09T22:52:10.352Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
493 | 2024-10-09T22:52:10.354Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
494 | 2024-10-09T22:52:10.360Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
495 | 2024-10-09T22:52:10.360Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
496 | 2024-10-09T22:52:10.360Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
497 | 2024-10-09T22:52:10.361Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
498 | 2024-10-09T22:52:10.361Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
499 | 2024-10-09T22:52:10.364Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
500 | 2024-10-09T22:52:10.364Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
501 | 2024-10-09T22:52:10.364Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
502 | 2024-10-09T22:52:10.365Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
503 | 2024-10-09T22:52:10.395Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
504 | 2024-10-09T22:52:10.395Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
505 | 2024-10-09T22:52:10.395Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
506 | 2024-10-09T22:52:10.396Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
507 | 2024-10-09T22:52:10.399Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
508 | 2024-10-09T22:52:10.410Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
509 | 2024-10-09T22:52:10.410Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
510 | 2024-10-09T22:52:10.410Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
511 | 2024-10-09T22:52:10.410Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
512 | 2024-10-09T22:52:10.447Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
513 | 2024-10-09T22:52:10.448Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
514 | 2024-10-09T22:52:10.449Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
515 | 2024-10-09T22:52:10.479Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
516 | 2024-10-09T22:52:10.479Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
517 | 2024-10-09T22:52:10.479Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
518 | 2024-10-09T22:52:10.479Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
519 | 2024-10-09T22:52:10.479Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
520 | 2024-10-09T22:52:10.481Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
521 | 2024-10-09T22:52:10.481Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
522 | 2024-10-09T22:52:10.481Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
523 | 2024-10-09T22:52:10.482Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
524 | 2024-10-09T22:52:10.484Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
525 | 2024-10-09T22:52:10.484Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
526 | 2024-10-09T22:52:10.484Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
527 | 2024-10-09T22:52:10.484Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
528 | 2024-10-09T22:52:10.488Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
529 | 2024-10-09T22:52:10.498Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
530 | 2024-10-09T22:52:10.533Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
531 | 2024-10-09T22:52:10.533Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
532 | 2024-10-09T22:52:10.534Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
533 | 2024-10-09T22:52:10.615Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
534 | 2024-10-09T22:52:10.615Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
535 | 2024-10-09T22:52:10.616Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
536 | 2024-10-09T22:52:10.620Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
537 | 2024-10-09T22:52:10.620Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
538 | 2024-10-09T22:52:10.620Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
539 | 2024-10-09T22:52:10.620Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
540 | 2024-10-09T22:52:10.621Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
541 | 2024-10-09T22:52:10.637Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
542 | 2024-10-09T22:52:10.637Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
543 | 2024-10-09T22:52:10.637Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
544 | 2024-10-09T22:52:10.638Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
545 | 2024-10-09T22:52:10.645Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
546 | 2024-10-09T22:52:10.645Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
547 | 2024-10-09T22:52:10.645Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
548 | 2024-10-09T22:52:10.646Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
549 | 2024-10-09T22:52:10.648Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
550 | 2024-10-09T22:52:10.660Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
551 | 2024-10-09T22:52:10.661Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
552 | 2024-10-09T22:52:10.661Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
553 | 2024-10-09T22:52:10.661Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
554 | 2024-10-09T22:52:10.677Z | INFO | test_utilization (DataLoader): created built-in services vpc subnets
|
555 | 2024-10-09T22:52:10.677Z | INFO | test_utilization (DataLoader): created built-in services vpc
|
556 | 2024-10-09T22:52:10.677Z | TRAC | test_utilization (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
557 | 2024-10-09T22:52:10.677Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
558 | 2024-10-09T22:52:10.681Z | DEBG | test_utilization (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
559 | 2024-10-09T22:52:10.681Z | DEBG | test_utilization (DataLoader): attempting to create silo users
|
560 | 2024-10-09T22:52:10.681Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
561 | 2024-10-09T22:52:10.681Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
562 | 2024-10-09T22:52:10.682Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
563 | 2024-10-09T22:52:10.702Z | INFO | test_utilization (DataLoader): created 2 silo users
|
564 | 2024-10-09T22:52:10.702Z | DEBG | test_utilization (DataLoader): attempting to create silo user role assignments
|
565 | 2024-10-09T22:52:10.702Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
566 | 2024-10-09T22:52:10.702Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
567 | 2024-10-09T22:52:10.704Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
568 | 2024-10-09T22:52:10.710Z | INFO | test_utilization (DataLoader): created 2 silo user role assignments
|
569 | 2024-10-09T22:52:10.710Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
570 | 2024-10-09T22:52:10.711Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
571 | 2024-10-09T22:52:10.712Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
572 | 2024-10-09T22:52:10.729Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
573 | 2024-10-09T22:52:10.729Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
574 | 2024-10-09T22:52:10.731Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
575 | 2024-10-09T22:52:10.761Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
|
576 | 2024-10-09T22:52:10.761Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
577 | 2024-10-09T22:52:10.761Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
578 | 2024-10-09T22:52:10.761Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
579 | 2024-10-09T22:52:10.762Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
580 | 2024-10-09T22:52:10.775Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
581 | 2024-10-09T22:52:10.779Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
result = Ok(())
|
582 | 2024-10-09T22:52:10.779Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
583 | 2024-10-09T22:52:10.779Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
584 | 2024-10-09T22:52:10.780Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
585 | 2024-10-09T22:52:10.793Z | TRAC | test_utilization (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
|
586 | 2024-10-09T22:52:10.793Z | TRAC | test_utilization (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
587 | 2024-10-09T22:52:10.793Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
588 | 2024-10-09T22:52:10.793Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
589 | 2024-10-09T22:52:10.794Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
590 | 2024-10-09T22:52:10.797Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
591 | 2024-10-09T22:52:10.799Z | DEBG | test_utilization (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
result = Ok(())
|
592 | 2024-10-09T22:52:10.801Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
593 | 2024-10-09T22:52:10.801Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
594 | 2024-10-09T22:52:10.802Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
595 | 2024-10-09T22:52:10.955Z | TRAC | test_utilization (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
596 | 2024-10-09T22:52:10.955Z | DEBG | test_utilization (DataLoader): roles
roles = RoleSet { roles: {} }
|
597 | 2024-10-09T22:52:10.956Z | DEBG | test_utilization (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
598 | 2024-10-09T22:52:10.964Z | INFO | test_utilization (nexus): populate complete
|
599 | 2024-10-09T22:52:10.964Z | INFO | test_utilization (nexus): activating background tasks
|
600 | 2024-10-09T22:52:10.967Z | DEBG | test_utilization (init_with_steps): Running step start_sled1
|
601 | 2024-10-09T22:52:10.968Z | INFO | test_utilization (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
602 | 2024-10-09T22:52:11.082Z | INFO | test_utilization (SledAgent): created simulated sled agent
server = b6d65341-167c-41df-9b5c-41cded99c229
sim_mode = Explicit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
603 | 2024-10-09T22:52:11.091Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /boot-disk/{boot_disk}/os/write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
604 | 2024-10-09T22:52:11.091Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /boot-disk/{boot_disk}/os/write/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
605 | 2024-10-09T22:52:11.091Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = DELETE
path = /boot-disk/{boot_disk}/os/write/status/{update_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
606 | 2024-10-09T22:52:11.091Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /bootstore/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
607 | 2024-10-09T22:52:11.091Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /cockroachdb
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
608 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
609 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
610 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /disks/{disk_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
611 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /disks/{disk_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
612 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /eip-gateways
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
613 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
614 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
615 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
616 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /omicron-physical-disks
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
617 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /omicron-physical-disks
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
618 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /omicron-zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
619 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /omicron-zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
620 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /sled-identifiers
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
621 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /sled-role
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
622 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /sleds
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
623 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
624 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /timesync
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
625 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /update
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
626 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = DELETE
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
627 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
628 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
629 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = DELETE
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
630 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
631 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
632 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
633 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
634 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /vmms/{propolis_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
635 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
636 | 2024-10-09T22:52:11.092Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
637 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
638 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
639 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
640 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
641 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
642 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
643 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /zones/bundle-cleanup
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
644 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
645 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = PUT
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
646 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
647 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones/bundles
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
648 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
649 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = POST
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
650 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
651 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
652 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:41369
method = GET
path = /zpools
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
653 | 2024-10-09T22:52:11.093Z | INFO | test_utilization (dropshot): listening
local_addr = [::1]:41369
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
654 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:41369
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
655 | 2024-10-09T22:52:11.093Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 1
reason = Timeout
|
656 | 2024-10-09T22:52:11.095Z | DEBG | test_utilization (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
657 | 2024-10-09T22:52:11.095Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
658 | 2024-10-09T22:52:11.095Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
659 | 2024-10-09T22:52:11.095Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
660 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 1
reason = Timeout
|
661 | 2024-10-09T22:52:11.096Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
662 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 1
reason = Timeout
|
663 | 2024-10-09T22:52:11.096Z | WARN | test_utilization (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config nor servers
|
664 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 66.976\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
665 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 1
reason = Timeout
|
666 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
667 | 2024-10-09T22:52:11.096Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
668 | 2024-10-09T22:52:11.096Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
669 | 2024-10-09T22:52:11.097Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
670 | 2024-10-09T22:52:11.097Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 1
reason = Timeout
|
671 | 2024-10-09T22:52:11.097Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
672 | 2024-10-09T22:52:11.097Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 1
reason = Timeout
|
673 | 2024-10-09T22:52:11.097Z | WARN | test_utilization (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config nor servers
|
674 | 2024-10-09T22:52:11.097Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 21.079\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
675 | 2024-10-09T22:52:11.097Z | DEBG | test_utilization (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
676 | 2024-10-09T22:52:11.098Z | DEBG | test_utilization (NexusClient): client request
body = Some(Body)
method = POST
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:52787/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
677 | 2024-10-09T22:52:11.099Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:61282
|
678 | 2024-10-09T22:52:11.099Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = metrics_producer_gc
iteration = 1
reason = Timeout
|
679 | 2024-10-09T22:52:11.099Z | INFO | test_utilization (BackgroundTasks): Metric producer GC running
background_task = metrics_producer_gc
expiration = 2024-10-09 22:42:11.099637422 UTC
|
680 | 2024-10-09T22:52:11.099Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = metrics_producer_gc
resource = Database
|
681 | 2024-10-09T22:52:11.099Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = metrics_producer_gc
roles = RoleSet { roles: {} }
|
682 | 2024-10-09T22:52:11.100Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = metrics_producer_gc
resource = Database
result = Ok(())
|
683 | 2024-10-09T22:52:11.100Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = external_endpoints
iteration = 1
reason = Timeout
|
684 | 2024-10-09T22:52:11.100Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
685 | 2024-10-09T22:52:11.100Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
686 | 2024-10-09T22:52:11.100Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
687 | 2024-10-09T22:52:11.100Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
688 | 2024-10-09T22:52:11.101Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
689 | 2024-10-09T22:52:11.101Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = nat_v4_garbage_collector
iteration = 1
reason = Timeout
|
690 | 2024-10-09T22:52:11.101Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = nat_v4_garbage_collector
resource = Database
|
691 | 2024-10-09T22:52:11.101Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = nat_v4_garbage_collector
roles = RoleSet { roles: {} }
|
692 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = nat_v4_garbage_collector
resource = Database
result = Ok(())
|
693 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = bfd_manager
iteration = 1
reason = Timeout
|
694 | 2024-10-09T22:52:11.102Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = bfd_manager
resource = Database
|
695 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = bfd_manager
roles = RoleSet { roles: {} }
|
696 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = bfd_manager
resource = Database
result = Ok(())
|
697 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = phantom_disks
iteration = 1
reason = Timeout
|
698 | 2024-10-09T22:52:11.102Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 1
reason = Timeout
|
699 | 2024-10-09T22:52:11.102Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
700 | 2024-10-09T22:52:11.102Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
701 | 2024-10-09T22:52:11.103Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
|
702 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
703 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
704 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 1
reason = Timeout
|
705 | 2024-10-09T22:52:11.103Z | WARN | test_utilization (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = no blueprint
|
706 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 56.338\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
707 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 1
reason = Timeout
|
708 | 2024-10-09T22:52:11.103Z | WARN | test_utilization (BackgroundTasks): Blueprint execution: skipped
background_task = crdb_node_id_collector
reason = no blueprint
|
709 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 41.088\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
710 | 2024-10-09T22:52:11.103Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = inventory_collection
iteration = 1
reason = Timeout
|
711 | 2024-10-09T22:52:11.103Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
712 | 2024-10-09T22:52:11.103Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
713 | 2024-10-09T22:52:11.104Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
714 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
715 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
716 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 1
reason = Timeout
|
717 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 37.428\u{b5}s
iteration = 1
status = {"error":"task disabled"}
|
718 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = decommissioned_disk_cleaner
iteration = 1
reason = Timeout
|
719 | 2024-10-09T22:52:11.104Z | INFO | test_utilization (BackgroundTasks): Decommissioned Disk Cleaner disabled
background_task = decommissioned_disk_cleaner
|
720 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = decommissioned_disk_cleaner
elapsed = 78.187\u{b5}s
iteration = 1
status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
|
721 | 2024-10-09T22:52:11.104Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = service_zone_nat_tracker
iteration = 1
reason = Timeout
|
722 | 2024-10-09T22:52:11.104Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Inventory
|
723 | 2024-10-09T22:52:11.105Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_zone_nat_tracker
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
724 | 2024-10-09T22:52:11.105Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
|
725 | 2024-10-09T22:52:11.105Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {} }
|
726 | 2024-10-09T22:52:11.105Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
result = Ok(())
|
727 | 2024-10-09T22:52:11.105Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = switch_port_config_manager
iteration = 1
reason = Timeout
|
728 | 2024-10-09T22:52:11.105Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Fleet
|
729 | 2024-10-09T22:52:11.105Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = switch_port_config_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
730 | 2024-10-09T22:52:11.106Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
|
731 | 2024-10-09T22:52:11.106Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
732 | 2024-10-09T22:52:11.106Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
733 | 2024-10-09T22:52:11.106Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = v2p_manager
iteration = 1
reason = Timeout
|
734 | 2024-10-09T22:52:11.106Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
735 | 2024-10-09T22:52:11.107Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
736 | 2024-10-09T22:52:11.107Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
737 | 2024-10-09T22:52:11.107Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_replacement
iteration = 1
reason = Timeout
|
738 | 2024-10-09T22:52:11.107Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
|
739 | 2024-10-09T22:52:11.107Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
740 | 2024-10-09T22:52:11.108Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
741 | 2024-10-09T22:52:11.108Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_replacement_driver
iteration = 1
reason = Timeout
|
742 | 2024-10-09T22:52:11.108Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
|
743 | 2024-10-09T22:52:11.108Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
744 | 2024-10-09T22:52:11.109Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
745 | 2024-10-09T22:52:11.109Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = instance_watcher
iteration = 1
reason = Timeout
|
746 | 2024-10-09T22:52:11.109Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Fleet
|
747 | 2024-10-09T22:52:11.110Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = instance_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
748 | 2024-10-09T22:52:11.110Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
|
749 | 2024-10-09T22:52:11.110Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
750 | 2024-10-09T22:52:11.110Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
751 | 2024-10-09T22:52:11.110Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = instance_updater
iteration = 1
reason = Timeout
|
752 | 2024-10-09T22:52:11.110Z | INFO | test_utilization (BackgroundTasks): background instance updater explicitly disabled
background_task = instance_updater
|
753 | 2024-10-09T22:52:11.111Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = instance_updater
elapsed = 346.254\u{b5}s
iteration = 1
status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
|
754 | 2024-10-09T22:52:11.111Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = instance_reincarnation
iteration = 1
reason = Timeout
|
755 | 2024-10-09T22:52:11.111Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
|
756 | 2024-10-09T22:52:11.111Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
757 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
758 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = service_firewall_rule_propagation
iteration = 1
reason = Timeout
|
759 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (service-firewall-rule-progator): starting background task for service firewall rule propagation
background_task = service_firewall_rule_propagation
|
760 | 2024-10-09T22:52:11.112Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
761 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
762 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
763 | 2024-10-09T22:52:11.112Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 1
reason = Timeout
|
764 | 2024-10-09T22:52:11.112Z | INFO | test_utilization (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
765 | 2024-10-09T22:52:11.112Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
766 | 2024-10-09T22:52:11.112Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
767 | 2024-10-09T22:52:11.113Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
768 | 2024-10-09T22:52:11.113Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
769 | 2024-10-09T22:52:11.113Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
770 | 2024-10-09T22:52:11.113Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = abandoned_vmm_reaper
iteration = 1
reason = Timeout
|
771 | 2024-10-09T22:52:11.114Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = abandoned_vmm_reaper
resource = Database
|
772 | 2024-10-09T22:52:11.114Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = abandoned_vmm_reaper
roles = RoleSet { roles: {} }
|
773 | 2024-10-09T22:52:11.114Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = abandoned_vmm_reaper
resource = Database
result = Ok(())
|
774 | 2024-10-09T22:52:11.114Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = saga_recovery
iteration = 1
reason = Timeout
|
775 | 2024-10-09T22:52:11.114Z | DEBG | test_utilization (SagaRecoverer): listing candidate sagas for recovery
|
776 | 2024-10-09T22:52:11.115Z | TRAC | test_utilization (SagaRecoverer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. })
resource = Database
|
777 | 2024-10-09T22:52:11.115Z | DEBG | test_utilization (SagaRecoverer): roles
roles = RoleSet { roles: {} }
|
778 | 2024-10-09T22:52:11.115Z | DEBG | test_utilization (SagaRecoverer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. })
resource = Database
result = Ok(())
|
779 | 2024-10-09T22:52:11.115Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = lookup_region_port
iteration = 1
reason = Timeout
|
780 | 2024-10-09T22:52:11.116Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = lookup_region_port
resource = Database
|
781 | 2024-10-09T22:52:11.116Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = lookup_region_port
roles = RoleSet { roles: {} }
|
782 | 2024-10-09T22:52:11.116Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = lookup_region_port
resource = Database
result = Ok(())
|
783 | 2024-10-09T22:52:11.116Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_snapshot_replacement_start
iteration = 1
reason = Timeout
|
784 | 2024-10-09T22:52:11.116Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_start
elapsed = 60.897\u{b5}s
iteration = 1
status = {"errors":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
785 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_snapshot_replacement_garbage_collection
iteration = 1
reason = Timeout
|
786 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_garbage_collection
elapsed = 30.408\u{b5}s
iteration = 1
status = {"errors":[],"garbage_collect_requested":[]}
|
787 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_snapshot_replacement_step
iteration = 1
reason = Timeout
|
788 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_step
elapsed = 69.816\u{b5}s
iteration = 1
status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[]}
|
789 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = region_snapshot_replacement_finish
iteration = 1
reason = Timeout
|
790 | 2024-10-09T22:52:11.117Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_finish
elapsed = 65.497\u{b5}s
iteration = 1
status = {"errors":[],"records_set_to_done":[]}
|
791 | 2024-10-09T22:52:11.117Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
792 | 2024-10-09T22:52:11.118Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
793 | 2024-10-09T22:52:11.118Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
794 | 2024-10-09T22:52:11.118Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
795 | 2024-10-09T22:52:11.118Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
796 | 2024-10-09T22:52:11.119Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
797 | 2024-10-09T22:52:11.119Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
798 | 2024-10-09T22:52:11.119Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
799 | 2024-10-09T22:52:11.119Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
800 | 2024-10-09T22:52:11.120Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
801 | 2024-10-09T22:52:11.134Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:61282
req_id = 4243e3bb-187d-4054-b90e-0c9b13a7880e
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
802 | 2024-10-09T22:52:11.134Z | TRAC | test_utilization (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 94 a7 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:54368
req_id = 334c6c9f-fa87-4fc9-bfd7-9cacd5a6ea5e
|
803 | 2024-10-09T22:52:11.135Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 38055,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:54368
req_id = 334c6c9f-fa87-4fc9-bfd7-9cacd5a6ea5e
|
804 | 2024-10-09T22:52:11.136Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 38055,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_nameservice._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_nameservice._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
12,
95,
110,
97,
109,
101,
115,
101,
114,
118,
105,
99,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:54368
req_id = 334c6c9f-fa87-4fc9-bfd7-9cacd5a6ea5e
|
805 | 2024-10-09T22:52:11.137Z | TRAC | test_utilization (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: aa b6 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:51652
req_id = 68130267-161f-4c43-9ecf-5d7187f31231
|
806 | 2024-10-09T22:52:11.137Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 43702,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:51652
req_id = 68130267-161f-4c43-9ecf-5d7187f31231
|
807 | 2024-10-09T22:52:11.137Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 43702,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_external-dns._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_external-dns._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
13,
95,
101,
120,
116,
101,
114,
110,
97,
108,
45,
100,
110,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:51652
req_id = 68130267-161f-4c43-9ecf-5d7187f31231
|
808 | 2024-10-09T22:52:11.138Z | INFO | test_utilization (nexus): registered sled agent
sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
|
809 | 2024-10-09T22:52:11.141Z | WARN | test_utilization (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_internal
dns_group = internal
error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
810 | 2024-10-09T22:52:11.141Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 45.568793ms
iteration = 1
status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
811 | 2024-10-09T22:52:11.141Z | WARN | test_utilization (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_external
dns_group = external
error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
812 | 2024-10-09T22:52:11.141Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 44.57195ms
iteration = 1
status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
813 | 2024-10-09T22:52:11.156Z | INFO | test_utilization (BackgroundTasks): Metric producer GC complete (no errors)
background_task = metrics_producer_gc
expiration = 2024-10-09 22:42:11.099637422 UTC
pruned = {}
|
814 | 2024-10-09T22:52:11.156Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = metrics_producer_gc
elapsed = 56.835894ms
iteration = 1
status = {"expiration":"2024-10-09T22:42:11.099637422Z","pruned":[]}
|
815 | 2024-10-09T22:52:11.174Z | TRAC | test_utilization (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
816 | 2024-10-09T22:52:11.174Z | TRAC | test_utilization (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
817 | 2024-10-09T22:52:11.232Z | TRAC | test_utilization (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 5c 5c 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 \\\\..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:49953
req_id = 49b9940c-5a20-4e4c-b566-0743552bbb61
|
818 | 2024-10-09T22:52:11.232Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 23644,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:49953
req_id = 49b9940c-5a20-4e4c-b566-0743552bbb61
|
819 | 2024-10-09T22:52:11.233Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 23644,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:49953
req_id = 49b9940c-5a20-4e4c-b566-0743552bbb61
|
820 | 2024-10-09T22:52:11.233Z | TRAC | test_utilization (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 6b 7f 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 k............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:64591
req_id = 50151ebf-3c5e-46c6-9a2f-410bbcc14d7e
|
821 | 2024-10-09T22:52:11.233Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 27519,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:64591
req_id = 50151ebf-3c5e-46c6-9a2f-410bbcc14d7e
|
822 | 2024-10-09T22:52:11.233Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 27519,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:64591
req_id = 50151ebf-3c5e-46c6-9a2f-410bbcc14d7e
|
823 | 2024-10-09T22:52:11.243Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
824 | 2024-10-09T22:52:11.256Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
825 | 2024-10-09T22:52:11.256Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
826 | 2024-10-09T22:52:11.256Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
827 | 2024-10-09T22:52:11.257Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
828 | 2024-10-09T22:52:11.258Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = phantom_disks
elapsed = 155.914399ms
iteration = 1
status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
|
829 | 2024-10-09T22:52:11.259Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
830 | 2024-10-09T22:52:11.268Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
831 | 2024-10-09T22:52:11.268Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
|
832 | 2024-10-09T22:52:11.268Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
833 | 2024-10-09T22:52:11.270Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
834 | 2024-10-09T22:52:11.272Z | ERRO | test_utilization (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_v4_garbage_collector
error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
835 | 2024-10-09T22:52:11.273Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = nat_v4_garbage_collector
elapsed = 171.746253ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
836 | 2024-10-09T22:52:11.273Z | ERRO | test_utilization (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
837 | 2024-10-09T22:52:11.273Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = bfd_manager
elapsed = 171.164221ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
838 | 2024-10-09T22:52:11.304Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
839 | 2024-10-09T22:52:11.327Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
840 | 2024-10-09T22:52:11.328Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
841 | 2024-10-09T22:52:11.328Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
842 | 2024-10-09T22:52:11.329Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
843 | 2024-10-09T22:52:11.345Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
844 | 2024-10-09T22:52:11.351Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Fleet
result = Ok(())
|
845 | 2024-10-09T22:52:11.351Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
|
846 | 2024-10-09T22:52:11.351Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
847 | 2024-10-09T22:52:11.352Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
848 | 2024-10-09T22:52:11.352Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
849 | 2024-10-09T22:52:11.360Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Inventory
result = Ok(())
|
850 | 2024-10-09T22:52:11.360Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
|
851 | 2024-10-09T22:52:11.360Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {} }
|
852 | 2024-10-09T22:52:11.361Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
result = Ok(())
|
853 | 2024-10-09T22:52:11.362Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
854 | 2024-10-09T22:52:11.368Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Fleet
result = Ok(())
|
855 | 2024-10-09T22:52:11.369Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
|
856 | 2024-10-09T22:52:11.369Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
857 | 2024-10-09T22:52:11.370Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
858 | 2024-10-09T22:52:11.373Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
859 | 2024-10-09T22:52:11.374Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
860 | 2024-10-09T22:52:11.374Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
861 | 2024-10-09T22:52:11.475Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = lookup_region_port
elapsed = 359.580426ms
iteration = 1
status = {"errors":[],"found_port_ok":[]}
|
862 | 2024-10-09T22:52:11.509Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
863 | 2024-10-09T22:52:11.518Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
864 | 2024-10-09T22:52:11.529Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
|
865 | 2024-10-09T22:52:11.529Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
866 | 2024-10-09T22:52:11.530Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
867 | 2024-10-09T22:52:11.534Z | DEBG | test_utilization (BackgroundTasks): Found abandoned VMMs
background_task = abandoned_vmm_reaper
count = 0
total = 0
|
868 | 2024-10-09T22:52:11.534Z | INFO | test_utilization (BackgroundTasks): Abandoned VMMs reaped
background_task = abandoned_vmm_reaper
sled_reservations_deleted = 0
vmms_already_deleted = 0
vmms_deleted = 0
vmms_found = 0
|
869 | 2024-10-09T22:52:11.534Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = abandoned_vmm_reaper
elapsed = 421.02542ms
iteration = 1
status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
|
870 | 2024-10-09T22:52:11.545Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
871 | 2024-10-09T22:52:11.550Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
872 | 2024-10-09T22:52:11.550Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
873 | 2024-10-09T22:52:11.550Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
874 | 2024-10-09T22:52:11.550Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
875 | 2024-10-09T22:52:11.550Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
876 | 2024-10-09T22:52:11.551Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
877 | 2024-10-09T22:52:11.570Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
|
878 | 2024-10-09T22:52:11.570Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
879 | 2024-10-09T22:52:11.570Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
880 | 2024-10-09T22:52:11.570Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
881 | 2024-10-09T22:52:11.571Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
882 | 2024-10-09T22:52:11.571Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
|
883 | 2024-10-09T22:52:11.571Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
884 | 2024-10-09T22:52:11.571Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
885 | 2024-10-09T22:52:11.577Z | WARN | test_utilization (BackgroundTasks): failed to read target blueprint
background_task = blueprint_loader
error = Internal Error: no target blueprint set
|
886 | 2024-10-09T22:52:11.577Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 474.151872ms
iteration = 1
status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
|
887 | 2024-10-09T22:52:11.577Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = switch_port_config_manager
elapsed = 472.001465ms
iteration = 1
status = {}
|
888 | 2024-10-09T22:52:11.590Z | INFO | test_utilization (SagaRecoverer): listed in-progress sagas
count = 0
|
889 | 2024-10-09T22:52:11.590Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = saga_recovery
elapsed = 475.576404ms
iteration = 1
status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
|
890 | 2024-10-09T22:52:11.590Z | WARN | test_utilization (BackgroundTasks): inventory collection is None
background_task = service_zone_nat_tracker
|
891 | 2024-10-09T22:52:11.590Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = service_zone_nat_tracker
elapsed = 485.668641ms
iteration = 1
status = {"error":"inventory collection is None"}
|
892 | 2024-10-09T22:52:11.590Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
893 | 2024-10-09T22:52:11.590Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
894 | 2024-10-09T22:52:11.591Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
895 | 2024-10-09T22:52:11.591Z | DEBG | test_utilization (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
896 | 2024-10-09T22:52:11.591Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
897 | 2024-10-09T22:52:11.591Z | TRAC | test_utilization (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 0e 0a 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:53063
req_id = 670879fb-0d16-49c9-83c4-acd19e7a4a5e
|
898 | 2024-10-09T22:52:11.592Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3594,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:53063
req_id = 670879fb-0d16-49c9-83c4-acd19e7a4a5e
|
899 | 2024-10-09T22:52:11.592Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 3594,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:53063
req_id = 670879fb-0d16-49c9-83c4-acd19e7a4a5e
|
900 | 2024-10-09T22:52:11.592Z | WARN | test_utilization (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
901 | 2024-10-09T22:52:11.592Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 488.993712ms
iteration = 1
status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
902 | 2024-10-09T22:52:11.647Z | TRAC | test_utilization (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = instance failed
total_found = 0
|
903 | 2024-10-09T22:52:11.647Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
|
904 | 2024-10-09T22:52:11.647Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
905 | 2024-10-09T22:52:11.648Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
906 | 2024-10-09T22:52:11.648Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_replacement
elapsed = 540.894672ms
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
907 | 2024-10-09T22:52:11.654Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
908 | 2024-10-09T22:52:11.663Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
909 | 2024-10-09T22:52:11.663Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
910 | 2024-10-09T22:52:11.663Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
911 | 2024-10-09T22:52:11.663Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
912 | 2024-10-09T22:52:11.667Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
913 | 2024-10-09T22:52:11.691Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
914 | 2024-10-09T22:52:11.724Z | WARN | test_utilization (BackgroundTasks): failed to read DNS config
background_task = dns_config_internal
dns_group = internal
error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
|
915 | 2024-10-09T22:52:11.724Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 630.765367ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
|
916 | 2024-10-09T22:52:11.726Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
917 | 2024-10-09T22:52:11.726Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
918 | 2024-10-09T22:52:11.726Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
919 | 2024-10-09T22:52:11.726Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
920 | 2024-10-09T22:52:11.727Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
921 | 2024-10-09T22:52:12.006Z | WARN | test_utilization (BackgroundTasks): failed to read DNS config
background_task = dns_config_external
dns_group = external
error = Internal Error: expected exactly one latest version for DNS group External, found 0
|
922 | 2024-10-09T22:52:12.006Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 909.85608ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
|
923 | 2024-10-09T22:52:12.006Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
924 | 2024-10-09T22:52:12.012Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
925 | 2024-10-09T22:52:12.012Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
926 | 2024-10-09T22:52:12.012Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
927 | 2024-10-09T22:52:12.013Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
928 | 2024-10-09T22:52:12.013Z | INFO | test_utilization (BackgroundTasks): all instance checks complete
background_task = instance_watcher
pruned_instances = 0
total_completed = 0
total_failed = 0
total_incomplete = 0
total_instances = 0
update_sagas_queued = 0
|
929 | 2024-10-09T22:52:12.013Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = instance_watcher
elapsed = 904.110794ms
iteration = 1
status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
|
930 | 2024-10-09T22:52:12.024Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = region_replacement_driver
elapsed = 915.476961ms
iteration = 1
status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
|
931 | 2024-10-09T22:52:12.024Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
932 | 2024-10-09T22:52:12.024Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
933 | 2024-10-09T22:52:12.024Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
934 | 2024-10-09T22:52:12.025Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
935 | 2024-10-09T22:52:12.075Z | WARN | test_utilization (BackgroundTasks): failed to read Silo/DNS/TLS configuration
background_task = external_endpoints
error = Internal Error: expected at least one external DNS zone
|
936 | 2024-10-09T22:52:12.075Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 974.626984ms
iteration = 1
status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
|
937 | 2024-10-09T22:52:12.101Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
938 | 2024-10-09T22:52:12.102Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
939 | 2024-10-09T22:52:12.102Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
940 | 2024-10-09T22:52:12.106Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
941 | 2024-10-09T22:52:12.106Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = inventory_collection
iteration = 2
reason = Signaled
|
942 | 2024-10-09T22:52:12.107Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
943 | 2024-10-09T22:52:12.107Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
944 | 2024-10-09T22:52:12.107Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
945 | 2024-10-09T22:52:12.107Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
946 | 2024-10-09T22:52:12.107Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
947 | 2024-10-09T22:52:12.107Z | INFO | test_utilization (dropshot_internal): request completed
latency_us = 973564
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:61282
req_id = 4243e3bb-187d-4054-b90e-0c9b13a7880e
response_code = 204
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
948 | 2024-10-09T22:52:12.111Z | DEBG | test_utilization (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:52787/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "4243e3bb-187d-4054-b90e-0c9b13a7880e", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
949 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
950 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
951 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
952 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
953 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
954 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
955 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
956 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
957 | 2024-10-09T22:52:12.114Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40739
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
958 | 2024-10-09T22:52:12.114Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:40739
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
959 | 2024-10-09T22:52:12.115Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:40739
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
960 | 2024-10-09T22:52:12.116Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:40739
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
961 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
962 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
963 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
964 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
965 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
966 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
967 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
968 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
969 | 2024-10-09T22:52:12.117Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:43597
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
970 | 2024-10-09T22:52:12.117Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:43597
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
971 | 2024-10-09T22:52:12.118Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:43597
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
972 | 2024-10-09T22:52:12.118Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:43597
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
973 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
974 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
975 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
976 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
977 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
978 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
979 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
980 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
981 | 2024-10-09T22:52:12.120Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58201
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
982 | 2024-10-09T22:52:12.120Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:58201
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
983 | 2024-10-09T22:52:12.121Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:58201
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
984 | 2024-10-09T22:52:12.121Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:58201
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
985 | 2024-10-09T22:52:12.122Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
986 | 2024-10-09T22:52:12.122Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
987 | 2024-10-09T22:52:12.122Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
988 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
989 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
990 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
991 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
992 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
993 | 2024-10-09T22:52:12.123Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60043
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
994 | 2024-10-09T22:52:12.123Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:60043
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
995 | 2024-10-09T22:52:12.124Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:60043
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
996 | 2024-10-09T22:52:12.124Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:60043
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
997 | 2024-10-09T22:52:12.125Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
998 | 2024-10-09T22:52:12.125Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
999 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1000 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1001 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1002 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1003 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1004 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1005 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47528
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1006 | 2024-10-09T22:52:12.130Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:47528
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1007 | 2024-10-09T22:52:12.130Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:47528
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1008 | 2024-10-09T22:52:12.130Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:47528
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1009 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1010 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1011 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1012 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1013 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1014 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1015 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1016 | 2024-10-09T22:52:12.133Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1017 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:41225
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1018 | 2024-10-09T22:52:12.134Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:41225
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1019 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:41225
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1020 | 2024-10-09T22:52:12.134Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:41225
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1021 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1022 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1023 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1024 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1025 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1026 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1027 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1028 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1029 | 2024-10-09T22:52:12.134Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:58172
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1030 | 2024-10-09T22:52:12.134Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:58172
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1031 | 2024-10-09T22:52:12.135Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:58172
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1032 | 2024-10-09T22:52:12.135Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:58172
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1033 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1034 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1035 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1036 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1037 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1038 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1039 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1040 | 2024-10-09T22:52:12.176Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1041 | 2024-10-09T22:52:12.177Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:57825
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1042 | 2024-10-09T22:52:12.177Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:57825
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1043 | 2024-10-09T22:52:12.177Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:57825
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1044 | 2024-10-09T22:52:12.178Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:57825
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1045 | 2024-10-09T22:52:12.181Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1046 | 2024-10-09T22:52:12.181Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1047 | 2024-10-09T22:52:12.181Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1048 | 2024-10-09T22:52:12.181Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1049 | 2024-10-09T22:52:12.181Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1050 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1051 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1052 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1053 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61681
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1054 | 2024-10-09T22:52:12.182Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:61681
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1055 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:61681
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1056 | 2024-10-09T22:52:12.182Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:61681
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1057 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1058 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1059 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1060 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1061 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1062 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1063 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1064 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1065 | 2024-10-09T22:52:12.182Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:51932
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1066 | 2024-10-09T22:52:12.182Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:51932
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1067 | 2024-10-09T22:52:12.183Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:51932
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1068 | 2024-10-09T22:52:12.183Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:51932
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1069 | 2024-10-09T22:52:12.183Z | DEBG | test_utilization (init_with_steps): Running step start_sled2
|
1070 | 2024-10-09T22:52:12.183Z | INFO | test_utilization (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1071 | 2024-10-09T22:52:12.278Z | INFO | test_utilization (SledAgent): created simulated sled agent
server = 039be560-54cc-49e3-88df-1a29dadbf913
sim_mode = Explicit
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1072 | 2024-10-09T22:52:12.281Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /boot-disk/{boot_disk}/os/write
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1073 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /boot-disk/{boot_disk}/os/write/status
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1074 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = DELETE
path = /boot-disk/{boot_disk}/os/write/status/{update_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1075 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /bootstore/status
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1076 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /cockroachdb
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1077 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /datasets
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1078 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /datasets
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1079 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /disks/{disk_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1080 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /disks/{disk_id}/poke
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1081 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /eip-gateways
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1082 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /inventory
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1083 | 2024-10-09T22:52:12.282Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /network-bootstore-config
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1084 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /network-bootstore-config
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1085 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /omicron-physical-disks
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1086 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /omicron-physical-disks
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1087 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /omicron-zones
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1088 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /omicron-zones
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1089 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /sled-identifiers
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1090 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /sled-role
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1091 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /sleds
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1092 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /switch-ports
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1093 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /timesync
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1094 | 2024-10-09T22:52:12.283Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /update
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1095 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = DELETE
path = /v2p
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1096 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /v2p
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1097 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /v2p
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1098 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = DELETE
path = /vmms/{propolis_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1099 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /vmms/{propolis_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1100 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1101 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1102 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1103 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /vmms/{propolis_id}/poke
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1104 | 2024-10-09T22:52:12.284Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1105 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1106 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /vmms/{propolis_id}/state
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1107 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /vmms/{propolis_id}/state
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1108 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1109 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /vpc-routes
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1110 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /vpc-routes
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1111 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1112 | 2024-10-09T22:52:12.285Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /zones/bundle-cleanup
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1113 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones/bundle-cleanup/context
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1114 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = PUT
path = /zones/bundle-cleanup/context
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1115 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1116 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones/bundles
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1117 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones/bundles/{zone_name}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1118 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = POST
path = /zones/bundles/{zone_name}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1119 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1120 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1121 | 2024-10-09T22:52:12.286Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:56969
method = GET
path = /zpools
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1122 | 2024-10-09T22:52:12.287Z | INFO | test_utilization (dropshot): listening
local_addr = [::1]:56969
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1123 | 2024-10-09T22:52:12.287Z | DEBG | test_utilization (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:56969
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1124 | 2024-10-09T22:52:12.288Z | DEBG | test_utilization (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1125 | 2024-10-09T22:52:12.288Z | DEBG | test_utilization (NexusClient): client request
body = Some(Body)
method = POST
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = http://127.0.0.1:52787/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
|
1126 | 2024-10-09T22:52:12.289Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1127 | 2024-10-09T22:52:12.301Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1128 | 2024-10-09T22:52:12.301Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
1129 | 2024-10-09T22:52:12.301Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1130 | 2024-10-09T22:52:12.301Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1131 | 2024-10-09T22:52:12.302Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1132 | 2024-10-09T22:52:12.302Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1133 | 2024-10-09T22:52:12.303Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1134 | 2024-10-09T22:52:12.303Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1135 | 2024-10-09T22:52:12.303Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1136 | 2024-10-09T22:52:12.304Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1137 | 2024-10-09T22:52:12.304Z | TRAC | test_utilization (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = start saga failed
total_found = 0
|
1138 | 2024-10-09T22:52:12.304Z | WARN | test_utilization (BackgroundTasks): instance reincarnation completed with errors
background_task = instance_reincarnation
instances_changed_state = 0
instances_found = 0
instances_reincarnated = 0
query_errors = 0
restart_errors = 0
|
1139 | 2024-10-09T22:52:12.304Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = instance_reincarnation
elapsed = 1.193462147s
iteration = 1
status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
|
1140 | 2024-10-09T22:52:12.410Z | INFO | test_utilization (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
1141 | 2024-10-09T22:52:12.410Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:41369/vpc-routes
|
1142 | 2024-10-09T22:52:12.410Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1143 | 2024-10-09T22:52:12.431Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1144 | 2024-10-09T22:52:12.431Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1145 | 2024-10-09T22:52:12.432Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1146 | 2024-10-09T22:52:12.432Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1147 | 2024-10-09T22:52:12.435Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1148 | 2024-10-09T22:52:12.435Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1149 | 2024-10-09T22:52:12.435Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1150 | 2024-10-09T22:52:12.436Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1151 | 2024-10-09T22:52:12.437Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:35339
|
1152 | 2024-10-09T22:52:12.437Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:65021
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1153 | 2024-10-09T22:52:12.439Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:35339
req_id = 0a5f5374-ba9a-4b9c-b7e4-a992eafde0f9
uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
|
1154 | 2024-10-09T22:52:12.440Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:65021
req_id = e1577081-53e7-4941-bee9-c1e8fb997651
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
1155 | 2024-10-09T22:52:12.440Z | INFO | test_utilization (nexus): registered sled agent
sled_uuid = 039be560-54cc-49e3-88df-1a29dadbf913
|
1156 | 2024-10-09T22:52:12.441Z | INFO | test_utilization (dropshot): request completed
latency_us = 1042
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:65021
req_id = e1577081-53e7-4941-bee9-c1e8fb997651
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
1157 | 2024-10-09T22:52:12.441Z | DEBG | test_utilization (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
1158 | 2024-10-09T22:52:12.441Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
1159 | 2024-10-09T22:52:12.442Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1160 | 2024-10-09T22:52:12.442Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1161 | 2024-10-09T22:52:12.442Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1162 | 2024-10-09T22:52:12.443Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1163 | 2024-10-09T22:52:12.444Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:41369/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "e1577081-53e7-4941-bee9-c1e8fb997651", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1164 | 2024-10-09T22:52:12.444Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
1165 | 2024-10-09T22:52:12.444Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
1166 | 2024-10-09T22:52:12.445Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
1167 | 2024-10-09T22:52:12.446Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1168 | 2024-10-09T22:52:12.481Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1169 | 2024-10-09T22:52:12.481Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1170 | 2024-10-09T22:52:12.481Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1171 | 2024-10-09T22:52:12.482Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1172 | 2024-10-09T22:52:12.486Z | TRAC | test_utilization (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 9d df 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:62166
req_id = 134c2ac2-5dc5-4259-b0ed-64a32604a113
|
1173 | 2024-10-09T22:52:12.486Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 40415,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:62166
req_id = 134c2ac2-5dc5-4259-b0ed-64a32604a113
|
1174 | 2024-10-09T22:52:12.487Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 40415,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:62166
req_id = 134c2ac2-5dc5-4259-b0ed-64a32604a113
|
1175 | 2024-10-09T22:52:12.487Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1176 | 2024-10-09T22:52:12.487Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1177 | 2024-10-09T22:52:12.488Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1178 | 2024-10-09T22:52:12.488Z | WARN | test_utilization (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
1179 | 2024-10-09T22:52:12.488Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 381.90568ms
iteration = 2
status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
1180 | 2024-10-09T22:52:12.510Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1181 | 2024-10-09T22:52:12.511Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1182 | 2024-10-09T22:52:12.511Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1183 | 2024-10-09T22:52:12.526Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
1184 | 2024-10-09T22:52:12.526Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1185 | 2024-10-09T22:52:12.526Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1186 | 2024-10-09T22:52:12.526Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1187 | 2024-10-09T22:52:12.527Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1188 | 2024-10-09T22:52:12.528Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1189 | 2024-10-09T22:52:12.528Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1190 | 2024-10-09T22:52:12.529Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1191 | 2024-10-09T22:52:12.531Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1192 | 2024-10-09T22:52:12.540Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
1193 | 2024-10-09T22:52:12.540Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
1194 | 2024-10-09T22:52:12.540Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1195 | 2024-10-09T22:52:12.540Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1196 | 2024-10-09T22:52:12.540Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1197 | 2024-10-09T22:52:12.540Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1198 | 2024-10-09T22:52:12.541Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1199 | 2024-10-09T22:52:12.541Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1200 | 2024-10-09T22:52:12.541Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1201 | 2024-10-09T22:52:12.541Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1202 | 2024-10-09T22:52:12.542Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1203 | 2024-10-09T22:52:12.545Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1204 | 2024-10-09T22:52:12.545Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1205 | 2024-10-09T22:52:12.545Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1206 | 2024-10-09T22:52:12.546Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1207 | 2024-10-09T22:52:12.555Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1208 | 2024-10-09T22:52:12.556Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1209 | 2024-10-09T22:52:12.556Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1210 | 2024-10-09T22:52:12.557Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1211 | 2024-10-09T22:52:12.558Z | INFO | test_utilization (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = sim-b6d65341
|
1212 | 2024-10-09T22:52:12.559Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:41369/eip-gateways
|
1213 | 2024-10-09T22:52:12.560Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = inventory_collection
iteration = 3
reason = Signaled
|
1214 | 2024-10-09T22:52:12.560Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
1215 | 2024-10-09T22:52:12.560Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1216 | 2024-10-09T22:52:12.561Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1217 | 2024-10-09T22:52:12.561Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1218 | 2024-10-09T22:52:12.562Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1219 | 2024-10-09T22:52:12.562Z | INFO | test_utilization (dropshot_internal): request completed
latency_us = 122958
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:35339
req_id = 0a5f5374-ba9a-4b9c-b7e4-a992eafde0f9
response_code = 204
uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
|
1220 | 2024-10-09T22:52:12.562Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1221 | 2024-10-09T22:52:12.583Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1222 | 2024-10-09T22:52:12.584Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
1223 | 2024-10-09T22:52:12.584Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1224 | 2024-10-09T22:52:12.584Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1225 | 2024-10-09T22:52:12.585Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1226 | 2024-10-09T22:52:12.594Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1227 | 2024-10-09T22:52:12.603Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1228 | 2024-10-09T22:52:12.603Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1229 | 2024-10-09T22:52:12.603Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1230 | 2024-10-09T22:52:12.604Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1231 | 2024-10-09T22:52:12.604Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1232 | 2024-10-09T22:52:12.604Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1233 | 2024-10-09T22:52:12.605Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1234 | 2024-10-09T22:52:12.606Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:65021
req_id = c28a800b-1ed3-479f-b889-56d82b68e4a0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
1235 | 2024-10-09T22:52:12.607Z | DEBG | test_utilization (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:52787/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913", status: 204, headers: {"x-request-id": "0a5f5374-ba9a-4b9c-b7e4-a992eafde0f9", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1236 | 2024-10-09T22:52:12.607Z | INFO | test_utilization (dropshot): request completed
latency_us = 823
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:65021
req_id = c28a800b-1ed3-479f-b889-56d82b68e4a0
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
1237 | 2024-10-09T22:52:12.607Z | DEBG | test_utilization (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
1238 | 2024-10-09T22:52:12.607Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
1239 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1240 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1241 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1242 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1243 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1244 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1245 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1246 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1247 | 2024-10-09T22:52:12.609Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:47289
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1248 | 2024-10-09T22:52:12.610Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:47289
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1249 | 2024-10-09T22:52:12.610Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:47289
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1250 | 2024-10-09T22:52:12.610Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:47289
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1251 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1252 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1253 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1254 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1255 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1256 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1257 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1258 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1259 | 2024-10-09T22:52:12.611Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:40745
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1260 | 2024-10-09T22:52:12.611Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:40745
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1261 | 2024-10-09T22:52:12.613Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:40745
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1262 | 2024-10-09T22:52:12.613Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:40745
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1263 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1264 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1265 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1266 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1267 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1268 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1269 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1270 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1271 | 2024-10-09T22:52:12.620Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60124
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1272 | 2024-10-09T22:52:12.620Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:60124
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1273 | 2024-10-09T22:52:12.621Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:60124
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1274 | 2024-10-09T22:52:12.621Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:60124
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1275 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1276 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1277 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1278 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1279 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1280 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1281 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1282 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1283 | 2024-10-09T22:52:12.623Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37384
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1284 | 2024-10-09T22:52:12.624Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:37384
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1285 | 2024-10-09T22:52:12.624Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:37384
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1286 | 2024-10-09T22:52:12.624Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:37384
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1287 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1288 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1289 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1290 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1291 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1292 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1293 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1294 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1295 | 2024-10-09T22:52:12.626Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:33859
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1296 | 2024-10-09T22:52:12.626Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:33859
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1297 | 2024-10-09T22:52:12.628Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:33859
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1298 | 2024-10-09T22:52:12.628Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:33859
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1299 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1300 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1301 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1302 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1303 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1304 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1305 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1306 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1307 | 2024-10-09T22:52:12.645Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:37247
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1308 | 2024-10-09T22:52:12.645Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:37247
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1309 | 2024-10-09T22:52:12.646Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:37247
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1310 | 2024-10-09T22:52:12.646Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:37247
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1311 | 2024-10-09T22:52:12.648Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1312 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1313 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1314 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1315 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1316 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1317 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1318 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1319 | 2024-10-09T22:52:12.649Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61444
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1320 | 2024-10-09T22:52:12.649Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:61444
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1321 | 2024-10-09T22:52:12.650Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:61444
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1322 | 2024-10-09T22:52:12.650Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:61444
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1323 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1324 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1325 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1326 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1327 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1328 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1329 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1330 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1331 | 2024-10-09T22:52:12.651Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:61128
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1332 | 2024-10-09T22:52:12.651Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:61128
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1333 | 2024-10-09T22:52:12.652Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:61128
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1334 | 2024-10-09T22:52:12.652Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:61128
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1335 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1336 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1337 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1338 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1339 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1340 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1341 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1342 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1343 | 2024-10-09T22:52:12.654Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:60351
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1344 | 2024-10-09T22:52:12.654Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:60351
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1345 | 2024-10-09T22:52:12.655Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:60351
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1346 | 2024-10-09T22:52:12.655Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:60351
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1347 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = GET
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1348 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = POST
path = /crucible/0/regions
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1349 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = DELETE
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1350 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = GET
path = /crucible/0/regions/{id}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1351 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = GET
path = /crucible/0/regions/{id}/snapshots
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1352 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1353 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1354 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1355 | 2024-10-09T22:52:12.657Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:34180
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1356 | 2024-10-09T22:52:12.657Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:34180
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1357 | 2024-10-09T22:52:12.659Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:34180
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1358 | 2024-10-09T22:52:12.659Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:34180
kind = storage
server = 039be560-54cc-49e3-88df-1a29dadbf913
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1359 | 2024-10-09T22:52:12.659Z | DEBG | test_utilization (init_with_steps): Running step start_crucible_pantry
|
1360 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = GET
path = /crucible/pantry/0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1361 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = GET
path = /crucible/pantry/0/job/{id}/is-finished
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1362 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = GET
path = /crucible/pantry/0/job/{id}/ok
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1363 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = DELETE
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1364 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = GET
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1365 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1366 | 2024-10-09T22:52:12.661Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}/background
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1367 | 2024-10-09T22:52:12.662Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}/bulk-write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1368 | 2024-10-09T22:52:12.662Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}/import-from-url
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1369 | 2024-10-09T22:52:12.662Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}/scrub
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1370 | 2024-10-09T22:52:12.662Z | DEBG | test_utilization (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:52560
method = POST
path = /crucible/pantry/0/volume/{id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1371 | 2024-10-09T22:52:12.662Z | INFO | test_utilization (dropshot): listening
kind = pantry
local_addr = [::1]:52560
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1372 | 2024-10-09T22:52:12.663Z | DEBG | test_utilization (dropshot): successfully registered DTrace USDT probes
kind = pantry
local_addr = [::1]:52560
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1373 | 2024-10-09T22:52:12.663Z | INFO | test_utilization (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry
address = [::1]:52560
kind = pantry
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1374 | 2024-10-09T22:52:12.663Z | DEBG | test_utilization (init_with_steps): Running step populate_internal_dns
|
1375 | 2024-10-09T22:52:12.663Z | DEBG | test_utilization: Populating Internal DNS
|
1376 | 2024-10-09T22:52:12.768Z | INFO | test_utilization: DNS population: DnsConfigParams {
generation: 1,
time_created: 2024-10-09T22:52:12.767993753Z,
zones: [
DnsConfigZone {
records: {
"25d85810-cb07-4367-bdf0-6f0f7455e2d1.host": [
Aaaa(
::1,
),
],
"9793ffd6-511e-42de-bc27-3877ab933aa3.host": [
Aaaa(
::1,
),
],
"5c25e11c-a1af-4aab-a031-d6411689d751.host": [
Aaaa(
::1,
),
],
"dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host": [
Aaaa(
::1,
),
],
"_mgd._tcp": [
Srv(
Srv {
port: 49698,
prio: 0,
target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal",
weight: 0,
},
),
Srv(
Srv {
port: 51362,
prio: 0,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_clickhouse._tcp": [
Srv(
Srv {
port: 36390,
prio: 0,
target: "5c25e11c-a1af-4aab-a031-d6411689d751.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_dendrite._tcp": [
Srv(
Srv {
port: 56611,
prio: 0,
target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal",
weight: 0,
},
),
Srv(
Srv {
port: 32878,
prio: 0,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [
Aaaa(
::1,
),
],
"c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host": [
Aaaa(
::1,
),
],
"16bcf290-d2b8-479e-aae0-2fceec228e77.host": [
Aaaa(
::ffff:127.0.0.1,
),
],
"_cockroach._tcp": [
Srv(
Srv {
port: 61746,
prio: 0,
target: "9793ffd6-511e-42de-bc27-3877ab933aa3.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host": [
Aaaa(
::1,
),
],
"_nameservice._tcp": [
Srv(
Srv {
port: 37132,
prio: 0,
target: "fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_external-dns._tcp": [
Srv(
Srv {
port: 53582,
prio: 0,
target: "c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_crucible-pantry._tcp": [
Srv(
Srv {
port: 52560,
prio: 0,
target: "25d85810-cb07-4367-bdf0-6f0f7455e2d1.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_mgs._tcp": [
Srv(
Srv {
port: 55029,
prio: 0,
target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal",
weight: 0,
},
),
Srv(
Srv {
port: 59689,
prio: 0,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_clickhouse-native._tcp": [
Srv(
Srv {
port: 9000,
prio: 0,
target: "5c25e11c-a1af-4aab-a031-d6411689d751.host.control-plane.oxide.internal",
weight: 0,
},
),
],
"_nexus._tcp": [
Srv(
Srv {
port: 52787,
prio: 0,
target: "16bcf290-d2b8-479e-aae0-2fceec228e77.host.control-plane.oxide.internal",
weight: 0,
},
),
],
},
zone_name: "control-plane.oxide.internal",
},
],
}
|
1377 | 2024-10-09T22:52:12.768Z | DEBG | test_utilization: client request
body = Some(Body)
method = PUT
uri = http://[::1]:37132/config
|
1378 | 2024-10-09T22:52:12.775Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:41369/eip-gateways", status: 204, headers: {"x-request-id": "c28a800b-1ed3-479f-b889-56d82b68e4a0", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1379 | 2024-10-09T22:52:12.777Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 1.664534025s
iteration = 1
status = {}
|
1380 | 2024-10-09T22:52:12.778Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1381 | 2024-10-09T22:52:12.778Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1382 | 2024-10-09T22:52:12.778Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1383 | 2024-10-09T22:52:12.778Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1384 | 2024-10-09T22:52:12.787Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
1385 | 2024-10-09T22:52:12.787Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1386 | 2024-10-09T22:52:12.788Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1387 | 2024-10-09T22:52:12.789Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1388 | 2024-10-09T22:52:12.793Z | INFO | test_utilization (http): accepted connection
kind = dns
local_addr = [::1]:37132
remote_addr = [::1]:52640
|
1389 | 2024-10-09T22:52:12.794Z | TRAC | test_utilization (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: e8 8c 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:63815
req_id = 0064d747-f6d5-4e95-b2cd-296de0ae53cf
|
1390 | 2024-10-09T22:52:12.794Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 59532,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:63815
req_id = 0064d747-f6d5-4e95-b2cd-296de0ae53cf
|
1391 | 2024-10-09T22:52:12.795Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 59532,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:63815
req_id = 0064d747-f6d5-4e95-b2cd-296de0ae53cf
|
1392 | 2024-10-09T22:52:12.797Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1393 | 2024-10-09T22:52:12.798Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1394 | 2024-10-09T22:52:12.799Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1395 | 2024-10-09T22:52:12.800Z | WARN | test_utilization (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
1396 | 2024-10-09T22:52:12.800Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 240.701796ms
iteration = 3
status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
1397 | 2024-10-09T22:52:12.814Z | TRAC | test_utilization (http): incoming request
kind = dns
local_addr = [::1]:37132
method = PUT
remote_addr = [::1]:52640
req_id = 71e65bfb-be75-4c54-a3e8-fe2149ba1d78
uri = /config
|
1398 | 2024-10-09T22:52:12.815Z | INFO | test_utilization (store): attempting generation update
new_generation = 1
req_id = 71e65bfb-be75-4c54-a3e8-fe2149ba1d78
|
1399 | 2024-10-09T22:52:12.815Z | INFO | test_utilization (store): pruning trees for generations newer than 0
|
1400 | 2024-10-09T22:52:12.815Z | DEBG | test_utilization (store): creating tree
tree_name = generation_1_zone_control-plane.oxide.internal
|
1401 | 2024-10-09T22:52:12.825Z | DEBG | test_utilization (store): updating current config
|
1402 | 2024-10-09T22:52:12.830Z | DEBG | test_utilization (store): flushing default tree
|
1403 | 2024-10-09T22:52:12.834Z | INFO | test_utilization (store): pruning trees for generations older than 1
keep = 3
|
1404 | 2024-10-09T22:52:12.834Z | INFO | test_utilization (store): updated generation
new_generation = 1
req_id = 71e65bfb-be75-4c54-a3e8-fe2149ba1d78
|
1405 | 2024-10-09T22:52:12.834Z | INFO | test_utilization (http): request completed
kind = dns
latency_us = 20757
local_addr = [::1]:37132
method = PUT
remote_addr = [::1]:52640
req_id = 71e65bfb-be75-4c54-a3e8-fe2149ba1d78
response_code = 204
uri = /config
|
1406 | 2024-10-09T22:52:12.834Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1407 | 2024-10-09T22:52:12.834Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1408 | 2024-10-09T22:52:12.834Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1409 | 2024-10-09T22:52:12.834Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1410 | 2024-10-09T22:52:12.835Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1411 | 2024-10-09T22:52:12.854Z | DEBG | test_utilization: client response
result = Ok(Response { url: "http://[::1]:37132/config", status: 204, headers: {"x-request-id": "71e65bfb-be75-4c54-a3e8-fe2149ba1d78", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1412 | 2024-10-09T22:52:12.863Z | DEBG | test_utilization (init_with_steps): Running step configure_sled_agent1
|
1413 | 2024-10-09T22:52:12.953Z | DEBG | test_utilization: client request
body = Some(Body)
method = PUT
uri = http://[::1]:41369/omicron-zones
|
1414 | 2024-10-09T22:52:12.954Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1415 | 2024-10-09T22:52:12.954Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1416 | 2024-10-09T22:52:12.954Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1417 | 2024-10-09T22:52:12.955Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1418 | 2024-10-09T22:52:13.116Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:56969/v2p
|
1419 | 2024-10-09T22:52:13.117Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:44232
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1420 | 2024-10-09T22:52:13.117Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:56969
remote_addr = [::1]:63054
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1421 | 2024-10-09T22:52:13.118Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1422 | 2024-10-09T22:52:13.118Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1423 | 2024-10-09T22:52:13.118Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1424 | 2024-10-09T22:52:13.119Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1425 | 2024-10-09T22:52:13.120Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63054
req_id = 6b8d6b09-798c-4254-afe3-509c268442d8
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
1426 | 2024-10-09T22:52:13.120Z | INFO | test_utilization (dropshot): request completed
latency_us = 316
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63054
req_id = 6b8d6b09-798c-4254-afe3-509c268442d8
response_code = 200
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
1427 | 2024-10-09T22:52:13.126Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:44232
req_id = 6c559ba2-1430-47f7-ac4c-a0e498005cd9
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
1428 | 2024-10-09T22:52:13.126Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:56969/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b8d6b09-798c-4254-afe3-509c268442d8", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1429 | 2024-10-09T22:52:13.126Z | INFO | test_utilization (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-039be560
|
1430 | 2024-10-09T22:52:13.126Z | INFO | test_utilization (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-039be560
|
1431 | 2024-10-09T22:52:13.127Z | INFO | test_utilization (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = sim-039be560
|
1432 | 2024-10-09T22:52:13.128Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:41369/v2p
|
1433 | 2024-10-09T22:52:13.131Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1434 | 2024-10-09T22:52:13.140Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1435 | 2024-10-09T22:52:13.140Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
1436 | 2024-10-09T22:52:13.140Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1437 | 2024-10-09T22:52:13.140Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1438 | 2024-10-09T22:52:13.140Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1439 | 2024-10-09T22:52:13.140Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1440 | 2024-10-09T22:52:13.141Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1441 | 2024-10-09T22:52:13.141Z | INFO | test_utilization (dropshot): request completed
latency_us = 14942
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:44232
req_id = 6c559ba2-1430-47f7-ac4c-a0e498005cd9
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
1442 | 2024-10-09T22:52:13.142Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:57024
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1443 | 2024-10-09T22:52:13.143Z | DEBG | test_utilization: client response
result = Ok(Response { url: "http://[::1]:41369/omicron-zones", status: 204, headers: {"x-request-id": "6c559ba2-1430-47f7-ac4c-a0e498005cd9", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1444 | 2024-10-09T22:52:13.143Z | DEBG | test_utilization: client request
body = Some(Body)
method = PUT
uri = http://[::1]:41369/network-bootstore-config
|
1445 | 2024-10-09T22:52:13.144Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:57024
req_id = 885bb1de-f301-434d-8ac0-6a2c11862c4c
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
1446 | 2024-10-09T22:52:13.149Z | INFO | test_utilization (dropshot): request completed
latency_us = 4331
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:57024
req_id = 885bb1de-f301-434d-8ac0-6a2c11862c4c
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
1447 | 2024-10-09T22:52:13.149Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1448 | 2024-10-09T22:52:13.149Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1449 | 2024-10-09T22:52:13.149Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1450 | 2024-10-09T22:52:13.149Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1451 | 2024-10-09T22:52:13.151Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:44232
req_id = d80d1cc0-e203-419e-a51f-267106f59069
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
1452 | 2024-10-09T22:52:13.151Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:41369/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "885bb1de-f301-434d-8ac0-6a2c11862c4c", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1453 | 2024-10-09T22:52:13.151Z | INFO | test_utilization (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-b6d65341
|
1454 | 2024-10-09T22:52:13.151Z | INFO | test_utilization (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
1455 | 2024-10-09T22:52:13.151Z | INFO | test_utilization (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
1456 | 2024-10-09T22:52:13.153Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 2.046563338s
iteration = 1
status = {}
|
1457 | 2024-10-09T22:52:13.154Z | INFO | test_utilization (dropshot): request completed
latency_us = 2812
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:44232
req_id = d80d1cc0-e203-419e-a51f-267106f59069
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
1458 | 2024-10-09T22:52:13.158Z | DEBG | test_utilization: client response
result = Ok(Response { url: "http://[::1]:41369/network-bootstore-config", status: 204, headers: {"x-request-id": "d80d1cc0-e203-419e-a51f-267106f59069", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1459 | 2024-10-09T22:52:13.160Z | DEBG | test_utilization (init_with_steps): Running step configure_sled_agent2
|
1460 | 2024-10-09T22:52:13.240Z | DEBG | test_utilization: client request
body = Some(Body)
method = PUT
uri = http://[::1]:56969/omicron-zones
|
1461 | 2024-10-09T22:52:13.244Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1462 | 2024-10-09T22:52:13.245Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1463 | 2024-10-09T22:52:13.245Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1464 | 2024-10-09T22:52:13.246Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1465 | 2024-10-09T22:52:13.247Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:56969
remote_addr = [::1]:51990
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
1466 | 2024-10-09T22:52:13.260Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1467 | 2024-10-09T22:52:13.271Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1468 | 2024-10-09T22:52:13.271Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1469 | 2024-10-09T22:52:13.271Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1470 | 2024-10-09T22:52:13.272Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1471 | 2024-10-09T22:52:13.274Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:51990
req_id = b45d9105-291d-4983-81b6-817ac9c23d7b
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /omicron-zones
|
1472 | 2024-10-09T22:52:13.276Z | INFO | test_utilization (dropshot): request completed
latency_us = 2038
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:51990
req_id = b45d9105-291d-4983-81b6-817ac9c23d7b
response_code = 204
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /omicron-zones
|
1473 | 2024-10-09T22:52:13.279Z | DEBG | test_utilization: client response
result = Ok(Response { url: "http://[::1]:56969/omicron-zones", status: 204, headers: {"x-request-id": "b45d9105-291d-4983-81b6-817ac9c23d7b", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1474 | 2024-10-09T22:52:13.279Z | DEBG | test_utilization: client request
body = Some(Body)
method = PUT
uri = http://[::1]:56969/network-bootstore-config
|
1475 | 2024-10-09T22:52:13.292Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1476 | 2024-10-09T22:52:13.292Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1477 | 2024-10-09T22:52:13.292Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1478 | 2024-10-09T22:52:13.307Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:51990
req_id = 919722b8-29e5-44de-b40b-2afe8fd6c165
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /network-bootstore-config
|
1479 | 2024-10-09T22:52:13.310Z | INFO | test_utilization (dropshot): request completed
latency_us = 16509
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:51990
req_id = 919722b8-29e5-44de-b40b-2afe8fd6c165
response_code = 204
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /network-bootstore-config
|
1480 | 2024-10-09T22:52:13.314Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1481 | 2024-10-09T22:52:13.314Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1482 | 2024-10-09T22:52:13.314Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1483 | 2024-10-09T22:52:13.314Z | DEBG | test_utilization: client response
result = Ok(Response { url: "http://[::1]:56969/network-bootstore-config", status: 204, headers: {"x-request-id": "919722b8-29e5-44de-b40b-2afe8fd6c165", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
|
1484 | 2024-10-09T22:52:13.316Z | DEBG | test_utilization (init_with_steps): Running step start_nexus_external
|
1485 | 2024-10-09T22:52:13.316Z | DEBG | test_utilization: Starting Nexus (external API)
|
1486 | 2024-10-09T22:52:15.116Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1487 | 2024-10-09T22:52:15.116Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1488 | 2024-10-09T22:52:15.116Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1489 | 2024-10-09T22:52:15.116Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1490 | 2024-10-09T22:52:15.117Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1491 | 2024-10-09T22:52:15.129Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1492 | 2024-10-09T22:52:15.129Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1493 | 2024-10-09T22:52:15.130Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1494 | 2024-10-09T22:52:15.135Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1495 | 2024-10-09T22:52:15.140Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1496 | 2024-10-09T22:52:15.141Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1497 | 2024-10-09T22:52:15.141Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1498 | 2024-10-09T22:52:15.142Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1499 | 2024-10-09T22:52:15.146Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1500 | 2024-10-09T22:52:15.146Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1501 | 2024-10-09T22:52:15.148Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1502 | 2024-10-09T22:52:15.165Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1503 | 2024-10-09T22:52:15.165Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1504 | 2024-10-09T22:52:15.167Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1505 | 2024-10-09T22:52:15.177Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1506 | 2024-10-09T22:52:15.177Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1507 | 2024-10-09T22:52:15.177Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1508 | 2024-10-09T22:52:15.177Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1509 | 2024-10-09T22:52:15.178Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1510 | 2024-10-09T22:52:15.198Z | INFO | test_utilization (InternalApi): set cockroachdb setting
setting = cluster.preserve_downgrade_option
value = 22.1
|
1511 | 2024-10-09T22:52:15.198Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1512 | 2024-10-09T22:52:15.198Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1513 | 2024-10-09T22:52:15.199Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1514 | 2024-10-09T22:52:15.199Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1515 | 2024-10-09T22:52:15.199Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1516 | 2024-10-09T22:52:15.199Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1517 | 2024-10-09T22:52:15.200Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1518 | 2024-10-09T22:52:15.220Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
1519 | 2024-10-09T22:52:15.220Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1520 | 2024-10-09T22:52:15.220Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1521 | 2024-10-09T22:52:15.220Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1522 | 2024-10-09T22:52:15.221Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1523 | 2024-10-09T22:52:15.223Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1524 | 2024-10-09T22:52:15.223Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1525 | 2024-10-09T22:52:15.223Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1526 | 2024-10-09T22:52:15.224Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1527 | 2024-10-09T22:52:15.228Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1528 | 2024-10-09T22:52:15.244Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
1529 | 2024-10-09T22:52:15.244Z | DEBG | test_utilization (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some(
V6(
Ipv6Network {
addr: fd00:1122:3344:100::,
prefix: 56,
},
),
)
|
1530 | 2024-10-09T22:52:15.244Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1531 | 2024-10-09T22:52:15.244Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1532 | 2024-10-09T22:52:15.244Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1533 | 2024-10-09T22:52:15.258Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1534 | 2024-10-09T22:52:15.279Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1535 | 2024-10-09T22:52:15.279Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
1536 | 2024-10-09T22:52:15.280Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1537 | 2024-10-09T22:52:15.280Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1538 | 2024-10-09T22:52:15.280Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1539 | 2024-10-09T22:52:15.280Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1540 | 2024-10-09T22:52:15.280Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1541 | 2024-10-09T22:52:15.291Z | INFO | test_utilization (InternalApi): Using static configuration for external switchports
|
1542 | 2024-10-09T22:52:15.291Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1543 | 2024-10-09T22:52:15.292Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1544 | 2024-10-09T22:52:15.293Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1545 | 2024-10-09T22:52:15.299Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1546 | 2024-10-09T22:52:15.299Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1547 | 2024-10-09T22:52:15.299Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1548 | 2024-10-09T22:52:15.301Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1549 | 2024-10-09T22:52:15.330Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1550 | 2024-10-09T22:52:15.330Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1551 | 2024-10-09T22:52:15.330Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1552 | 2024-10-09T22:52:15.333Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1553 | 2024-10-09T22:52:15.354Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1554 | 2024-10-09T22:52:15.367Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1555 | 2024-10-09T22:52:15.367Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1556 | 2024-10-09T22:52:15.367Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1557 | 2024-10-09T22:52:15.368Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1558 | 2024-10-09T22:52:15.391Z | DEBG | test_utilization (service-firewall-rule-progator): resolved names for firewall rules
background_task = service_firewall_rule_propagation
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
1559 | 2024-10-09T22:52:15.392Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Fleet
|
1560 | 2024-10-09T22:52:15.392Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1561 | 2024-10-09T22:52:15.392Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1562 | 2024-10-09T22:52:15.392Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1563 | 2024-10-09T22:52:15.392Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1564 | 2024-10-09T22:52:15.400Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1565 | 2024-10-09T22:52:15.407Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Fleet
result = Ok(())
|
1566 | 2024-10-09T22:52:15.408Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1567 | 2024-10-09T22:52:15.408Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1568 | 2024-10-09T22:52:15.410Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1569 | 2024-10-09T22:52:15.412Z | INFO | test_utilization (InternalApi): Recording Rack Network Configuration
|
1570 | 2024-10-09T22:52:15.412Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1571 | 2024-10-09T22:52:15.412Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1572 | 2024-10-09T22:52:15.413Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1573 | 2024-10-09T22:52:15.436Z | TRAC | test_utilization (service-firewall-rule-progator): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:24:05.243015Z, allowed_ips: None }
background_task = service_firewall_rule_propagation
|
1574 | 2024-10-09T22:52:15.436Z | DEBG | test_utilization (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
background_task = service_firewall_rule_propagation
|
1575 | 2024-10-09T22:52:15.436Z | DEBG | test_utilization (service-firewall-rule-progator): resolved firewall rules for sled agents
background_task = service_firewall_rule_propagation
sled_agent_rules = []
|
1576 | 2024-10-09T22:52:15.436Z | DEBG | test_utilization (service-firewall-rule-progator): resolved 0 rules for sleds
background_task = service_firewall_rule_propagation
|
1577 | 2024-10-09T22:52:15.528Z | TRAC | test_utilization (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1578 | 2024-10-09T22:52:15.528Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1579 | 2024-10-09T22:52:15.528Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1580 | 2024-10-09T22:52:15.528Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1581 | 2024-10-09T22:52:15.529Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1582 | 2024-10-09T22:52:15.543Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1583 | 2024-10-09T22:52:15.553Z | DEBG | test_utilization (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1584 | 2024-10-09T22:52:15.553Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1585 | 2024-10-09T22:52:15.553Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1586 | 2024-10-09T22:52:15.553Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1587 | 2024-10-09T22:52:15.554Z | DEBG | test_utilization (service-firewall-rule-progator): resolved sleds for vpc oxide-services
background_task = service_firewall_rule_propagation
vpc_to_sled = []
|
1588 | 2024-10-09T22:52:15.554Z | DEBG | test_utilization (service-firewall-rule-progator): sending firewall rules to sled agents
background_task = service_firewall_rule_propagation
|
1589 | 2024-10-09T22:52:15.554Z | INFO | test_utilization (service-firewall-rule-progator): updated firewall rules on 0 sleds
background_task = service_firewall_rule_propagation
|
1590 | 2024-10-09T22:52:15.554Z | DEBG | test_utilization (service-firewall-rule-progator): successfully propagated service firewall rules
background_task = service_firewall_rule_propagation
elapsed = 4.441974287s
|
1591 | 2024-10-09T22:52:15.554Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = service_firewall_rule_propagation
elapsed = 4.442008334s
iteration = 1
status = {}
|
1592 | 2024-10-09T22:52:15.576Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
|
1593 | 2024-10-09T22:52:15.576Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1594 | 2024-10-09T22:52:15.576Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1595 | 2024-10-09T22:52:15.577Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1596 | 2024-10-09T22:52:15.578Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1597 | 2024-10-09T22:52:15.581Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1598 | 2024-10-09T22:52:15.595Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1599 | 2024-10-09T22:52:15.596Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1600 | 2024-10-09T22:52:15.596Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1601 | 2024-10-09T22:52:15.596Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1602 | 2024-10-09T22:52:15.605Z | TRAC | test_utilization (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
|
1603 | 2024-10-09T22:52:15.605Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1604 | 2024-10-09T22:52:15.605Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1605 | 2024-10-09T22:52:15.605Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1606 | 2024-10-09T22:52:15.606Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1607 | 2024-10-09T22:52:15.611Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1608 | 2024-10-09T22:52:15.617Z | DEBG | test_utilization (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1609 | 2024-10-09T22:52:15.641Z | TRAC | test_utilization (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
|
1610 | 2024-10-09T22:52:15.641Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1611 | 2024-10-09T22:52:15.641Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1612 | 2024-10-09T22:52:15.641Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1613 | 2024-10-09T22:52:15.642Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1614 | 2024-10-09T22:52:15.646Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1615 | 2024-10-09T22:52:15.654Z | DEBG | test_utilization (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: d081866c-526e-415e-82a9-145907337912, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1616 | 2024-10-09T22:52:15.663Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
|
1617 | 2024-10-09T22:52:15.663Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1618 | 2024-10-09T22:52:15.663Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1619 | 2024-10-09T22:52:15.663Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1620 | 2024-10-09T22:52:15.664Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1621 | 2024-10-09T22:52:15.667Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1622 | 2024-10-09T22:52:15.673Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
result = Ok(())
|
1623 | 2024-10-09T22:52:15.819Z | INFO | test_utilization (InternalApi): inserted blueprint
blueprint_id = b9064604-eb1d-458f-b3cc-ed9fc1f31242
|
1624 | 2024-10-09T22:52:15.819Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
|
1625 | 2024-10-09T22:52:15.819Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1626 | 2024-10-09T22:52:15.819Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1627 | 2024-10-09T22:52:15.819Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1628 | 2024-10-09T22:52:15.821Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1629 | 2024-10-09T22:52:15.824Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1630 | 2024-10-09T22:52:15.831Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
result = Ok(())
|
1631 | 2024-10-09T22:52:15.837Z | INFO | test_utilization (InternalApi): No networking records needed for cockroach_db service
|
1632 | 2024-10-09T22:52:15.837Z | INFO | test_utilization (InternalApi): No networking records needed for clickhouse service
|
1633 | 2024-10-09T22:52:15.838Z | INFO | test_utilization (InternalApi): No networking records needed for internal_dns service
|
1634 | 2024-10-09T22:52:15.938Z | INFO | test_utilization (InternalApi): Inserted networking records for external_dns service
|
1635 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): Inserted networking records for nexus service
|
1636 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): No networking records needed for crucible_pantry service
|
1637 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): Inserted service networking records
|
1638 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): Inserted physical disks
|
1639 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): Inserted zpools
|
1640 | 2024-10-09T22:52:15.973Z | INFO | test_utilization (InternalApi): Inserted datasets
|
1641 | 2024-10-09T22:52:15.989Z | INFO | test_utilization (InternalApi): Populated DNS tables for internal DNS
|
1642 | 2024-10-09T22:52:15.992Z | INFO | test_utilization (InternalApi): Populated DNS tables for external DNS
|
1643 | 2024-10-09T22:52:15.993Z | TRAC | test_utilization (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1644 | 2024-10-09T22:52:15.993Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1645 | 2024-10-09T22:52:15.993Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1646 | 2024-10-09T22:52:15.993Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1647 | 2024-10-09T22:52:15.994Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1648 | 2024-10-09T22:52:15.996Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1649 | 2024-10-09T22:52:16.001Z | DEBG | test_utilization (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1650 | 2024-10-09T22:52:16.001Z | TRAC | test_utilization (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1651 | 2024-10-09T22:52:16.001Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1652 | 2024-10-09T22:52:16.001Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1653 | 2024-10-09T22:52:16.001Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1654 | 2024-10-09T22:52:16.001Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1655 | 2024-10-09T22:52:16.006Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1656 | 2024-10-09T22:52:16.011Z | DEBG | test_utilization (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1657 | 2024-10-09T22:52:16.064Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1658 | 2024-10-09T22:52:16.064Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1659 | 2024-10-09T22:52:16.064Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1660 | 2024-10-09T22:52:16.064Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1661 | 2024-10-09T22:52:16.065Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1662 | 2024-10-09T22:52:16.067Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1663 | 2024-10-09T22:52:16.076Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1664 | 2024-10-09T22:52:16.076Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1665 | 2024-10-09T22:52:16.076Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1666 | 2024-10-09T22:52:16.076Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1667 | 2024-10-09T22:52:16.076Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1668 | 2024-10-09T22:52:16.076Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1669 | 2024-10-09T22:52:16.090Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1670 | 2024-10-09T22:52:16.098Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1671 | 2024-10-09T22:52:16.100Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1672 | 2024-10-09T22:52:16.100Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1673 | 2024-10-09T22:52:16.100Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1674 | 2024-10-09T22:52:16.100Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1675 | 2024-10-09T22:52:16.101Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1676 | 2024-10-09T22:52:16.103Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1677 | 2024-10-09T22:52:16.112Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1678 | 2024-10-09T22:52:16.124Z | INFO | test_utilization (InternalApi): Created recovery silo
|
1679 | 2024-10-09T22:52:16.129Z | INFO | test_utilization (InternalApi): Created recovery user
|
1680 | 2024-10-09T22:52:16.146Z | INFO | test_utilization (InternalApi): Created recovery user's password
|
1681 | 2024-10-09T22:52:16.146Z | TRAC | test_utilization (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ById(9c1defc9-b8dc-4eb6-acde-8c84570c6637) }
|
1682 | 2024-10-09T22:52:16.146Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 9c1defc9-b8dc-4eb6-acde-8c84570c6637
resource_type = Silo
|
1683 | 2024-10-09T22:52:16.146Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1684 | 2024-10-09T22:52:16.146Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1685 | 2024-10-09T22:52:16.147Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1686 | 2024-10-09T22:52:16.151Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1687 | 2024-10-09T22:52:16.151Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1688 | 2024-10-09T22:52:16.152Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1689 | 2024-10-09T22:52:16.152Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1690 | 2024-10-09T22:52:16.156Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1691 | 2024-10-09T22:52:16.160Z | DEBG | test_utilization (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ById(9c1defc9-b8dc-4eb6-acde-8c84570c6637) }
result = Ok(())
|
1692 | 2024-10-09T22:52:16.160Z | DEBG | test_utilization (InternalApi): Generated role assignment queries
|
1693 | 2024-10-09T22:52:16.176Z | INFO | test_utilization (InternalApi): Granted Silo privileges
|
1694 | 2024-10-09T22:52:16.176Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1695 | 2024-10-09T22:52:16.176Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1696 | 2024-10-09T22:52:16.176Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1697 | 2024-10-09T22:52:16.176Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1698 | 2024-10-09T22:52:16.177Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1699 | 2024-10-09T22:52:16.180Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1700 | 2024-10-09T22:52:16.183Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1701 | 2024-10-09T22:52:16.194Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1702 | 2024-10-09T22:52:16.195Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1703 | 2024-10-09T22:52:16.195Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1704 | 2024-10-09T22:52:16.198Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1705 | 2024-10-09T22:52:16.198Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1706 | 2024-10-09T22:52:16.199Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1707 | 2024-10-09T22:52:16.200Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1708 | 2024-10-09T22:52:16.201Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1709 | 2024-10-09T22:52:16.203Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1710 | 2024-10-09T22:52:16.207Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1711 | 2024-10-09T22:52:16.207Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1712 | 2024-10-09T22:52:16.207Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1713 | 2024-10-09T22:52:16.207Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1714 | 2024-10-09T22:52:16.208Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1715 | 2024-10-09T22:52:16.210Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1716 | 2024-10-09T22:52:16.210Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1717 | 2024-10-09T22:52:16.210Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1718 | 2024-10-09T22:52:16.211Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1719 | 2024-10-09T22:52:16.212Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1720 | 2024-10-09T22:52:16.212Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1721 | 2024-10-09T22:52:16.212Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1722 | 2024-10-09T22:52:16.213Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1723 | 2024-10-09T22:52:16.214Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1724 | 2024-10-09T22:52:16.223Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1725 | 2024-10-09T22:52:16.223Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
1726 | 2024-10-09T22:52:16.223Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1727 | 2024-10-09T22:52:16.223Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1728 | 2024-10-09T22:52:16.223Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1729 | 2024-10-09T22:52:16.223Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1730 | 2024-10-09T22:52:16.224Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1731 | 2024-10-09T22:52:16.226Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1732 | 2024-10-09T22:52:16.226Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1733 | 2024-10-09T22:52:16.226Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1734 | 2024-10-09T22:52:16.227Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1735 | 2024-10-09T22:52:16.228Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1736 | 2024-10-09T22:52:16.228Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1737 | 2024-10-09T22:52:16.228Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1738 | 2024-10-09T22:52:16.229Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1739 | 2024-10-09T22:52:16.230Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1740 | 2024-10-09T22:52:16.238Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1741 | 2024-10-09T22:52:16.238Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1742 | 2024-10-09T22:52:16.238Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1743 | 2024-10-09T22:52:16.238Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1744 | 2024-10-09T22:52:16.241Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1745 | 2024-10-09T22:52:16.241Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1746 | 2024-10-09T22:52:16.242Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1747 | 2024-10-09T22:52:16.243Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1748 | 2024-10-09T22:52:16.243Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1749 | 2024-10-09T22:52:16.245Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1750 | 2024-10-09T22:52:16.247Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1751 | 2024-10-09T22:52:16.247Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1752 | 2024-10-09T22:52:16.247Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1753 | 2024-10-09T22:52:16.249Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1754 | 2024-10-09T22:52:16.250Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1755 | 2024-10-09T22:52:16.250Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1756 | 2024-10-09T22:52:16.250Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1757 | 2024-10-09T22:52:16.251Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1758 | 2024-10-09T22:52:16.253Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1759 | 2024-10-09T22:52:16.253Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1760 | 2024-10-09T22:52:16.253Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1761 | 2024-10-09T22:52:16.254Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1762 | 2024-10-09T22:52:16.256Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1763 | 2024-10-09T22:52:16.256Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1764 | 2024-10-09T22:52:16.256Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1765 | 2024-10-09T22:52:16.257Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1766 | 2024-10-09T22:52:16.260Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1767 | 2024-10-09T22:52:16.267Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1768 | 2024-10-09T22:52:16.267Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
1769 | 2024-10-09T22:52:16.267Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1770 | 2024-10-09T22:52:16.267Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1771 | 2024-10-09T22:52:16.268Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1772 | 2024-10-09T22:52:16.275Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1773 | 2024-10-09T22:52:16.275Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1774 | 2024-10-09T22:52:16.276Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1775 | 2024-10-09T22:52:16.285Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1776 | 2024-10-09T22:52:16.285Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1777 | 2024-10-09T22:52:16.286Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1778 | 2024-10-09T22:52:16.288Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1779 | 2024-10-09T22:52:16.288Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1780 | 2024-10-09T22:52:16.289Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1781 | 2024-10-09T22:52:16.291Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1782 | 2024-10-09T22:52:16.291Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1783 | 2024-10-09T22:52:16.291Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1784 | 2024-10-09T22:52:16.291Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1785 | 2024-10-09T22:52:16.292Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1786 | 2024-10-09T22:52:16.294Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1787 | 2024-10-09T22:52:16.294Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1788 | 2024-10-09T22:52:16.294Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1789 | 2024-10-09T22:52:16.295Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1790 | 2024-10-09T22:52:16.298Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1791 | 2024-10-09T22:52:16.298Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1792 | 2024-10-09T22:52:16.298Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1793 | 2024-10-09T22:52:16.299Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1794 | 2024-10-09T22:52:16.301Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1795 | 2024-10-09T22:52:16.311Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1796 | 2024-10-09T22:52:16.311Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
1797 | 2024-10-09T22:52:16.311Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1798 | 2024-10-09T22:52:16.311Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1799 | 2024-10-09T22:52:16.311Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1800 | 2024-10-09T22:52:16.311Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1801 | 2024-10-09T22:52:16.311Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1802 | 2024-10-09T22:52:16.313Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1803 | 2024-10-09T22:52:16.313Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1804 | 2024-10-09T22:52:16.313Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1805 | 2024-10-09T22:52:16.314Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1806 | 2024-10-09T22:52:16.316Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1807 | 2024-10-09T22:52:16.316Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1808 | 2024-10-09T22:52:16.316Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1809 | 2024-10-09T22:52:16.317Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1810 | 2024-10-09T22:52:16.319Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1811 | 2024-10-09T22:52:16.329Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1812 | 2024-10-09T22:52:16.329Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1813 | 2024-10-09T22:52:16.329Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1814 | 2024-10-09T22:52:16.330Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1815 | 2024-10-09T22:52:16.334Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1816 | 2024-10-09T22:52:16.334Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1817 | 2024-10-09T22:52:16.335Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1818 | 2024-10-09T22:52:16.337Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1819 | 2024-10-09T22:52:16.337Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1820 | 2024-10-09T22:52:16.337Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1821 | 2024-10-09T22:52:16.339Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1822 | 2024-10-09T22:52:16.339Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1823 | 2024-10-09T22:52:16.340Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1824 | 2024-10-09T22:52:16.342Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1825 | 2024-10-09T22:52:16.342Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1826 | 2024-10-09T22:52:16.343Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1827 | 2024-10-09T22:52:16.345Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1828 | 2024-10-09T22:52:16.345Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1829 | 2024-10-09T22:52:16.345Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1830 | 2024-10-09T22:52:16.345Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1831 | 2024-10-09T22:52:16.346Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1832 | 2024-10-09T22:52:16.347Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1833 | 2024-10-09T22:52:16.348Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1834 | 2024-10-09T22:52:16.348Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1835 | 2024-10-09T22:52:16.348Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1836 | 2024-10-09T22:52:16.350Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1837 | 2024-10-09T22:52:16.350Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1838 | 2024-10-09T22:52:16.350Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1839 | 2024-10-09T22:52:16.350Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1840 | 2024-10-09T22:52:16.352Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1841 | 2024-10-09T22:52:16.362Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1842 | 2024-10-09T22:52:16.362Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
1843 | 2024-10-09T22:52:16.362Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1844 | 2024-10-09T22:52:16.362Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1845 | 2024-10-09T22:52:16.362Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1846 | 2024-10-09T22:52:16.362Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1847 | 2024-10-09T22:52:16.362Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1848 | 2024-10-09T22:52:16.364Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1849 | 2024-10-09T22:52:16.364Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1850 | 2024-10-09T22:52:16.364Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1851 | 2024-10-09T22:52:16.365Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1852 | 2024-10-09T22:52:16.366Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1853 | 2024-10-09T22:52:16.366Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1854 | 2024-10-09T22:52:16.366Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1855 | 2024-10-09T22:52:16.367Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1856 | 2024-10-09T22:52:16.368Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1857 | 2024-10-09T22:52:16.384Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1858 | 2024-10-09T22:52:16.384Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1859 | 2024-10-09T22:52:16.384Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1860 | 2024-10-09T22:52:16.384Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1861 | 2024-10-09T22:52:16.390Z | DEBG | test_utilization (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 855938d6-c6ba-4ca5-8a05-fa6126681555, kind: Service { id: c1af2954-8494-4f05-af95-e3cb4f5ecdb4 }, name: Name("external-dns-c1af2954-8494-4f05-af95-e3cb4f5ecdb4"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: eda79658-0739-4511-858a-4bfd5f366820, kind: Service { id: 16bcf290-d2b8-479e-aae0-2fceec228e77 }, name: Name("nexus-16bcf290-d2b8-479e-aae0-2fceec228e77"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]}
subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]}
vpc_interfaces = {}
|
1862 | 2024-10-09T22:52:16.390Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1863 | 2024-10-09T22:52:16.391Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1864 | 2024-10-09T22:52:16.391Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1865 | 2024-10-09T22:52:16.391Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1866 | 2024-10-09T22:52:16.392Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1867 | 2024-10-09T22:52:16.393Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1868 | 2024-10-09T22:52:16.398Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1869 | 2024-10-09T22:52:16.398Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1870 | 2024-10-09T22:52:16.398Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
1871 | 2024-10-09T22:52:16.399Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1872 | 2024-10-09T22:52:16.401Z | TRAC | test_utilization (nexus): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:52:16.183775Z, allowed_ips: None }
|
1873 | 2024-10-09T22:52:16.401Z | DEBG | test_utilization (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
1874 | 2024-10-09T22:52:16.402Z | DEBG | test_utilization (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 855938d6-c6ba-4ca5-8a05-fa6126681555, kind: Service { id: c1af2954-8494-4f05-af95-e3cb4f5ecdb4 }, name: Name("external-dns-c1af2954-8494-4f05-af95-e3cb4f5ecdb4"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: eda79658-0739-4511-858a-4bfd5f366820, kind: Service { id: 16bcf290-d2b8-479e-aae0-2fceec228e77 }, name: Name("nexus-16bcf290-d2b8-479e-aae0-2fceec228e77"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
|
1875 | 2024-10-09T22:52:16.402Z | DEBG | test_utilization (nexus): resolved 2 rules for sleds
|
1876 | 2024-10-09T22:52:16.430Z | DEBG | test_utilization (nexus): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:52:11.138627Z, time_modified: 2024-10-09T22:52:11.138627Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(41369), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
|
1877 | 2024-10-09T22:52:16.430Z | DEBG | test_utilization (nexus): sending firewall rules to sled agents
|
1878 | 2024-10-09T22:52:16.430Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
1879 | 2024-10-09T22:52:16.430Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
1880 | 2024-10-09T22:52:16.431Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
1881 | 2024-10-09T22:52:16.434Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
1882 | 2024-10-09T22:52:16.434Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1883 | 2024-10-09T22:52:16.435Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
1884 | 2024-10-09T22:52:16.436Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
1885 | 2024-10-09T22:52:16.436Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
1886 | 2024-10-09T22:52:16.438Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
1887 | 2024-10-09T22:52:16.443Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
1888 | 2024-10-09T22:52:16.522Z | DEBG | test_utilization (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:41369/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1889 | 2024-10-09T22:52:16.523Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:60186
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1890 | 2024-10-09T22:52:16.537Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:60186
req_id = a7f92a8a-2a01-4b5c-8b8a-6e4689f0d941
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1891 | 2024-10-09T22:52:16.538Z | INFO | test_utilization (dropshot): request completed
latency_us = 14372
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:60186
req_id = a7f92a8a-2a01-4b5c-8b8a-6e4689f0d941
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1892 | 2024-10-09T22:52:16.538Z | DEBG | test_utilization (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:41369/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "a7f92a8a-2a01-4b5c-8b8a-6e4689f0d941", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
1893 | 2024-10-09T22:52:16.540Z | INFO | test_utilization (nexus): updated firewall rules on 1 sleds
|
1894 | 2024-10-09T22:52:16.540Z | TRAC | test_utilization (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
|
1895 | 2024-10-09T22:52:16.540Z | DEBG | test_utilization (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
1896 | 2024-10-09T22:52:16.541Z | DEBG | test_utilization (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
result = Ok(())
|
1897 | 2024-10-09T22:52:16.541Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 2
reason = Signaled
|
1898 | 2024-10-09T22:52:16.541Z | DEBG | test_utilization (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
1899 | 2024-10-09T22:52:16.541Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1900 | 2024-10-09T22:52:16.541Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1901 | 2024-10-09T22:52:16.542Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1902 | 2024-10-09T22:52:16.542Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 2
reason = Signaled
|
1903 | 2024-10-09T22:52:16.542Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
1904 | 2024-10-09T22:52:16.542Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 2
reason = Signaled
|
1905 | 2024-10-09T22:52:16.542Z | DEBG | test_utilization (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
1906 | 2024-10-09T22:52:16.542Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
1907 | 2024-10-09T22:52:16.542Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
1908 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
1909 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 2
reason = Signaled
|
1910 | 2024-10-09T22:52:16.543Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
1911 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = external_endpoints
iteration = 2
reason = Signaled
|
1912 | 2024-10-09T22:52:16.543Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
1913 | 2024-10-09T22:52:16.543Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1914 | 2024-10-09T22:52:16.543Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1915 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1916 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1917 | 2024-10-09T22:52:16.543Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = inventory_collection
iteration = 4
reason = Signaled
|
1918 | 2024-10-09T22:52:16.544Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
1919 | 2024-10-09T22:52:16.544Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1920 | 2024-10-09T22:52:16.544Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1921 | 2024-10-09T22:52:16.544Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1922 | 2024-10-09T22:52:16.544Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1923 | 2024-10-09T22:52:16.545Z | TRAC | test_utilization (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 5d d3 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ]............_na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:64488
req_id = f1390d11-f164-4ca7-adba-9798d3a0bd1a
|
1924 | 2024-10-09T22:52:16.545Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 24019,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:64488
req_id = f1390d11-f164-4ca7-adba-9798d3a0bd1a
|
1925 | 2024-10-09T22:52:16.545Z | DEBG | test_utilization (store): query key
key = _nameservice._tcp
|
1926 | 2024-10-09T22:52:16.545Z | DEBG | test_utilization (store): query key
key = fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host
|
1927 | 2024-10-09T22:52:16.546Z | DEBG | test_utilization (dns): dns response
additional_records = [Record { name_labels: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:64488
query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37132, target: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal") })) }]
req_id = f1390d11-f164-4ca7-adba-9798d3a0bd1a
|
1928 | 2024-10-09T22:52:16.546Z | TRAC | test_utilization (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 3c 7a 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 <z..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:61779
req_id = 66c99fad-7ddd-43db-a231-a6d642b13bb5
|
1929 | 2024-10-09T22:52:16.546Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 15482,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:61779
req_id = 66c99fad-7ddd-43db-a231-a6d642b13bb5
|
1930 | 2024-10-09T22:52:16.546Z | DEBG | test_utilization (store): query key
key = _external-dns._tcp
|
1931 | 2024-10-09T22:52:16.546Z | DEBG | test_utilization (store): query key
key = c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host
|
1932 | 2024-10-09T22:52:16.546Z | DEBG | test_utilization (dns): dns response
additional_records = [Record { name_labels: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:61779
query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 53582, target: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal") })) }]
req_id = 66c99fad-7ddd-43db-a231-a6d642b13bb5
|
1933 | 2024-10-09T22:52:16.547Z | DEBG | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 37132, target: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4998, tv_nsec: 377207737 } })
|
1934 | 2024-10-09T22:52:16.547Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
1935 | 2024-10-09T22:52:16.547Z | DEBG | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 53582, target: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4998, tv_nsec: 377557660 } })
|
1936 | 2024-10-09T22:52:16.547Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
1937 | 2024-10-09T22:52:16.547Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
1938 | 2024-10-09T22:52:16.547Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1939 | 2024-10-09T22:52:16.548Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1940 | 2024-10-09T22:52:16.548Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1941 | 2024-10-09T22:52:16.548Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1942 | 2024-10-09T22:52:16.548Z | TRAC | test_utilization (ServiceBalancer): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
1943 | 2024-10-09T22:52:16.548Z | TRAC | test_utilization (ServiceBalancer): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1944 | 2024-10-09T22:52:16.548Z | TRAC | test_utilization (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
|
1945 | 2024-10-09T22:52:16.548Z | DEBG | test_utilization (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
1946 | 2024-10-09T22:52:16.549Z | DEBG | test_utilization (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
result = Ok(())
|
1947 | 2024-10-09T22:52:16.549Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
1948 | 2024-10-09T22:52:16.549Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1949 | 2024-10-09T22:52:16.549Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
1950 | 2024-10-09T22:52:16.549Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
1951 | 2024-10-09T22:52:16.550Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
1952 | 2024-10-09T22:52:16.550Z | TRAC | test_utilization (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: fe 22 01 00 00 01 00 00 00 00 00 01 24 66 61 39 ."..........$fa9\n0010: 66 61 39 36 32 2d 31 64 31 34 2d 34 33 39 34 2d fa962-1d14-4394-\n0020: 39 63 36 33 2d 39 62 33 63 61 64 34 63 36 36 63 9c63-9b3cad4c66c\n0030: 38 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 8.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:58783
req_id = 2912d7c0-aa5f-4702-9b8a-2fb670a95f88
|
1953 | 2024-10-09T22:52:16.550Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 65058,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 102,\n 97,\n 57,\n 102,\n 97,\n 57,\n 54,\n 50,\n 45,\n 49,\n 100,\n 49,\n 52,\n 45,\n 52,\n 51,\n 57,\n 52,\n 45,\n 57,\n 99,\n 54,\n 51,\n 45,\n 57,\n 98,\n 51,\n 99,\n 97,\n 100,\n 52,\n 99,\n 54,\n 54,\n 99,\n 56,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:58783
req_id = 2912d7c0-aa5f-4702-9b8a-2fb670a95f88
|
1954 | 2024-10-09T22:52:16.550Z | DEBG | test_utilization (store): query key
key = fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host
|
1955 | 2024-10-09T22:52:16.550Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:58783
query = LowerQuery { name: LowerName(Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal.")), original: Query { name: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("fa9fa962-1d14-4394-9c63-9b3cad4c66c8.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 2912d7c0-aa5f-4702-9b8a-2fb670a95f88
|
1956 | 2024-10-09T22:52:16.551Z | TRAC | test_utilization (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: bb dc 01 00 00 01 00 00 00 00 00 01 24 63 31 61 ............$c1a\n0010: 66 32 39 35 34 2d 38 34 39 34 2d 34 66 30 35 2d f2954-8494-4f05-\n0020: 61 66 39 35 2d 65 33 63 62 34 66 35 65 63 64 62 af95-e3cb4f5ecdb\n0030: 34 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 4.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:63174
req_id = 8b6b23f8-cff7-4aaa-ae10-c22a24cc8c7c
|
1957 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 48092,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 99,\n 49,\n 97,\n 102,\n 50,\n 57,\n 53,\n 52,\n 45,\n 56,\n 52,\n 57,\n 52,\n 45,\n 52,\n 102,\n 48,\n 53,\n 45,\n 97,\n 102,\n 57,\n 53,\n 45,\n 101,\n 51,\n 99,\n 98,\n 52,\n 102,\n 53,\n 101,\n 99,\n 100,\n 98,\n 52,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:63174
req_id = 8b6b23f8-cff7-4aaa-ae10-c22a24cc8c7c
|
1958 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (store): query key
key = c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host
|
1959 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:63174
query = LowerQuery { name: LowerName(Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal.")), original: Query { name: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("c1af2954-8494-4f05-af95-e3cb4f5ecdb4.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 8b6b23f8-cff7-4aaa-ae10-c22a24cc8c7c
|
1960 | 2024-10-09T22:52:16.551Z | INFO | test_utilization (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:37132] }
background_task = dns_servers_internal
dns_group = internal
|
1961 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 9.504206ms
iteration = 2
status = {"addresses":["[::1]:37132"]}
|
1962 | 2024-10-09T22:52:16.551Z | INFO | test_utilization (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:53582] }
background_task = dns_servers_external
dns_group = external
|
1963 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 8.769701ms
iteration = 2
status = {"addresses":["[::1]:53582"]}
|
1964 | 2024-10-09T22:52:16.551Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 2
reason = Dependency
|
1965 | 2024-10-09T22:52:16.551Z | WARN | test_utilization (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config
|
1966 | 2024-10-09T22:52:16.552Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 17.949\u{b5}s
iteration = 2
status = {"error":"no config"}
|
1967 | 2024-10-09T22:52:16.552Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 2
reason = Dependency
|
1968 | 2024-10-09T22:52:16.552Z | WARN | test_utilization (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config
|
1969 | 2024-10-09T22:52:16.552Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 10.199\u{b5}s
iteration = 2
status = {"error":"no config"}
|
1970 | 2024-10-09T22:52:16.553Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1971 | 2024-10-09T22:52:16.560Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
1972 | 2024-10-09T22:52:16.560Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1973 | 2024-10-09T22:52:16.561Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1974 | 2024-10-09T22:52:16.561Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1975 | 2024-10-09T22:52:16.562Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1976 | 2024-10-09T22:52:16.566Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1977 | 2024-10-09T22:52:16.566Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1978 | 2024-10-09T22:52:16.566Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1979 | 2024-10-09T22:52:16.567Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1980 | 2024-10-09T22:52:16.567Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1981 | 2024-10-09T22:52:16.574Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
1982 | 2024-10-09T22:52:16.576Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1983 | 2024-10-09T22:52:16.583Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
1984 | 2024-10-09T22:52:16.585Z | DEBG | test_utilization (BackgroundTasks): found DNS version
background_task = dns_config_internal
dns_group = internal
version = 1
|
1985 | 2024-10-09T22:52:16.585Z | DEBG | test_utilization (BackgroundTasks): reading DNS config
background_task = dns_config_internal
dns_group = internal
|
1986 | 2024-10-09T22:52:16.585Z | DEBG | test_utilization (BackgroundTasks): reading DNS zones
background_task = dns_config_internal
dns_group = internal
|
1987 | 2024-10-09T22:52:16.585Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
1988 | 2024-10-09T22:52:16.586Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1989 | 2024-10-09T22:52:16.586Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1990 | 2024-10-09T22:52:16.586Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1991 | 2024-10-09T22:52:16.586Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1992 | 2024-10-09T22:52:16.587Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
|
1993 | 2024-10-09T22:52:16.587Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1994 | 2024-10-09T22:52:16.587Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1995 | 2024-10-09T22:52:16.587Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1996 | 2024-10-09T22:52:16.588Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1997 | 2024-10-09T22:52:16.589Z | DEBG | test_utilization (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
1998 | 2024-10-09T22:52:16.589Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
1999 | 2024-10-09T22:52:16.590Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2000 | 2024-10-09T22:52:16.598Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
2001 | 2024-10-09T22:52:16.598Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
2002 | 2024-10-09T22:52:16.598Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
2003 | 2024-10-09T22:52:16.599Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
2004 | 2024-10-09T22:52:16.601Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2005 | 2024-10-09T22:52:16.608Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
2006 | 2024-10-09T22:52:16.609Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
2007 | 2024-10-09T22:52:16.609Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
2008 | 2024-10-09T22:52:16.609Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
2009 | 2024-10-09T22:52:16.610Z | DEBG | test_utilization (ServiceBalancer): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2010 | 2024-10-09T22:52:16.616Z | DEBG | test_utilization (ServiceBalancer): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
2011 | 2024-10-09T22:52:16.616Z | INFO | test_utilization (nexus): Rack initialized
|
2012 | 2024-10-09T22:52:16.616Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2013 | 2024-10-09T22:52:16.616Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2014 | 2024-10-09T22:52:16.617Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2015 | 2024-10-09T22:52:16.617Z | TRAC | test_utilization (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 33 56 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 3V..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:51189
req_id = c9dba9d5-64c5-4fa7-a22d-66ba3c0e443a
|
2016 | 2024-10-09T22:52:16.617Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 13142,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:51189
req_id = c9dba9d5-64c5-4fa7-a22d-66ba3c0e443a
|
2017 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (store): query key
key = _mgs._tcp
|
2018 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (store): query key
key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
|
2019 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
2020 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:51189
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55029, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 59689, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }]
req_id = c9dba9d5-64c5-4fa7-a22d-66ba3c0e443a
|
2021 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (BackgroundTasks): found zones
background_task = dns_config_internal
count = 1
dns_group = internal
|
2022 | 2024-10-09T22:52:16.618Z | DEBG | test_utilization (BackgroundTasks): listing DNS names for zone
background_task = dns_config_internal
batch_size = 100
dns_group = internal
dns_zone_id = 2e3938ad-acd8-4058-a10c-1b29d911d396
dns_zone_name = control-plane.oxide.internal
found_so_far = 0
version = 1
|
2023 | 2024-10-09T22:52:16.619Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
2024 | 2024-10-09T22:52:16.619Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2025 | 2024-10-09T22:52:16.619Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
2026 | 2024-10-09T22:52:16.619Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
2027 | 2024-10-09T22:52:16.619Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
2028 | 2024-10-09T22:52:16.621Z | DEBG | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55029, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 59689, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4998, tv_nsec: 451161833 } })
|
2029 | 2024-10-09T22:52:16.621Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
2030 | 2024-10-09T22:52:16.621Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
2031 | 2024-10-09T22:52:16.624Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2032 | 2024-10-09T22:52:16.624Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2033 | 2024-10-09T22:52:16.625Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2034 | 2024-10-09T22:52:16.630Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2035 | 2024-10-09T22:52:16.637Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
2036 | 2024-10-09T22:52:16.637Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
2037 | 2024-10-09T22:52:16.638Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
2038 | 2024-10-09T22:52:16.638Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
2039 | 2024-10-09T22:52:16.638Z | DEBG | test_utilization (BackgroundTasks): found DNS version
background_task = dns_config_external
dns_group = external
version = 2
|
2040 | 2024-10-09T22:52:16.638Z | DEBG | test_utilization (BackgroundTasks): reading DNS config
background_task = dns_config_external
dns_group = external
|
2041 | 2024-10-09T22:52:16.638Z | DEBG | test_utilization (BackgroundTasks): reading DNS zones
background_task = dns_config_external
dns_group = external
|
2042 | 2024-10-09T22:52:16.638Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
2043 | 2024-10-09T22:52:16.638Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2044 | 2024-10-09T22:52:16.638Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2045 | 2024-10-09T22:52:16.639Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2046 | 2024-10-09T22:52:16.639Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2047 | 2024-10-09T22:52:16.641Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2048 | 2024-10-09T22:52:16.641Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2049 | 2024-10-09T22:52:16.641Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2050 | 2024-10-09T22:52:16.641Z | TRAC | test_utilization (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: b8 39 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .9..........-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:65227
req_id = ac48d159-8cfc-45fe-a672-7fbb60ae79da
|
2051 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 47161,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:65227
req_id = ac48d159-8cfc-45fe-a672-7fbb60ae79da
|
2052 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (store): query key
key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
|
2053 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:65227
query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = ac48d159-8cfc-45fe-a672-7fbb60ae79da
|
2054 | 2024-10-09T22:52:16.642Z | TRAC | test_utilization (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 07 a2 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:58690
req_id = 346d159c-8051-4a88-a977-ae0ac3cde15b
|
2055 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 1954,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:58690
req_id = 346d159c-8051-4a88-a977-ae0ac3cde15b
|
2056 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
2057 | 2024-10-09T22:52:16.642Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:58690
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 346d159c-8051-4a88-a977-ae0ac3cde15b
|
2058 | 2024-10-09T22:52:16.643Z | DEBG | test_utilization (BackgroundTasks): found all DNS names for zone
background_task = dns_config_internal
dns_group = internal
dns_zone_id = 2e3938ad-acd8-4058-a10c-1b29d911d396
dns_zone_name = control-plane.oxide.internal
found_so_far = 18
version = 1
|
2059 | 2024-10-09T22:52:16.643Z | DEBG | test_utilization (BackgroundTasks): read DNS config
background_task = dns_config_internal
dns_group = internal
nzones = 1
version = 1
|
2060 | 2024-10-09T22:52:16.643Z | INFO | test_utilization (BackgroundTasks): found latest generation (first find)
background_task = dns_config_internal
dns_group = internal
generation = 1
|
2061 | 2024-10-09T22:52:16.643Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 102.12722ms
iteration = 2
status = {"generation":1}
|
2062 | 2024-10-09T22:52:16.643Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 3
reason = Dependency
|
2063 | 2024-10-09T22:52:16.715Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = dns_propagation_internal
body = Some(Body)
dns_group = internal
dns_server_url = http://[::1]:37132
generation = 1
method = PUT
servers = DnsServersList { addresses: [[::1]:37132] }
uri = http://[::1]:37132/config
|
2064 | 2024-10-09T22:52:16.716Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2065 | 2024-10-09T22:52:16.721Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
2066 | 2024-10-09T22:52:16.721Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2067 | 2024-10-09T22:52:16.721Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2068 | 2024-10-09T22:52:16.722Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2069 | 2024-10-09T22:52:16.722Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
2070 | 2024-10-09T22:52:16.722Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2071 | 2024-10-09T22:52:16.722Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
2072 | 2024-10-09T22:52:16.722Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
2073 | 2024-10-09T22:52:16.722Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
2074 | 2024-10-09T22:52:16.723Z | INFO | test_utilization (http): accepted connection
kind = dns
local_addr = [::1]:37132
remote_addr = [::1]:39149
|
2075 | 2024-10-09T22:52:16.824Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
2076 | 2024-10-09T22:52:16.825Z | DEBG | test_utilization (BackgroundTasks): found zones
background_task = dns_config_external
count = 1
dns_group = external
|
2077 | 2024-10-09T22:52:16.825Z | DEBG | test_utilization (BackgroundTasks): listing DNS names for zone
background_task = dns_config_external
batch_size = 100
dns_group = external
dns_zone_id = cd840f04-1f41-4bd2-93be-21ddc45f211a
dns_zone_name = oxide-dev.test
found_so_far = 0
version = 2
|
2078 | 2024-10-09T22:52:16.825Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
2079 | 2024-10-09T22:52:16.825Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2080 | 2024-10-09T22:52:16.825Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2081 | 2024-10-09T22:52:16.825Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2082 | 2024-10-09T22:52:16.826Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2083 | 2024-10-09T22:52:16.826Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2084 | 2024-10-09T22:52:16.831Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
2085 | 2024-10-09T22:52:16.831Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
2086 | 2024-10-09T22:52:16.831Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
2087 | 2024-10-09T22:52:16.831Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
2088 | 2024-10-09T22:52:16.832Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
2089 | 2024-10-09T22:52:16.832Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2090 | 2024-10-09T22:52:16.832Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2091 | 2024-10-09T22:52:16.832Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2092 | 2024-10-09T22:52:16.833Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2093 | 2024-10-09T22:52:16.833Z | TRAC | test_utilization (http): incoming request
kind = dns
local_addr = [::1]:37132
method = PUT
remote_addr = [::1]:39149
req_id = decafdf1-dc94-4fbb-8535-95762a0a9b9f
uri = /config
|
2094 | 2024-10-09T22:52:16.833Z | INFO | test_utilization (store): attempting generation update
new_generation = 1
req_id = decafdf1-dc94-4fbb-8535-95762a0a9b9f
|
2095 | 2024-10-09T22:52:16.834Z | INFO | test_utilization (store): updated generation
new_generation = 1
req_id = decafdf1-dc94-4fbb-8535-95762a0a9b9f
|
2096 | 2024-10-09T22:52:16.834Z | INFO | test_utilization (http): request completed
kind = dns
latency_us = 1121
local_addr = [::1]:37132
method = PUT
remote_addr = [::1]:39149
req_id = decafdf1-dc94-4fbb-8535-95762a0a9b9f
response_code = 204
uri = /config
|
2097 | 2024-10-09T22:52:16.835Z | TRAC | test_utilization (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 71 0a 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c q............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:58181
req_id = 77424b67-cd39-49bb-b213-55c6bcc0b94d
|
2098 | 2024-10-09T22:52:16.835Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 28938,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:58181
req_id = 77424b67-cd39-49bb-b213-55c6bcc0b94d
|
2099 | 2024-10-09T22:52:16.836Z | DEBG | test_utilization (store): query key
key = _clickhouse-admin-keeper._tcp
|
2100 | 2024-10-09T22:52:16.836Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 28938,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:58181
req_id = 77424b67-cd39-49bb-b213-55c6bcc0b94d
|
2101 | 2024-10-09T22:52:16.836Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:37132
generation = 1
result = Ok(Response { url: "http://[::1]:37132/config", status: 204, headers: {"x-request-id": "decafdf1-dc94-4fbb-8535-95762a0a9b9f", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
servers = DnsServersList { addresses: [[::1]:37132] }
|
2102 | 2024-10-09T22:52:16.836Z | INFO | test_utilization (BackgroundTasks): DNS server now at generation 1
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:37132
generation = 1
servers = DnsServersList { addresses: [[::1]:37132] }
|
2103 | 2024-10-09T22:52:16.837Z | INFO | test_utilization (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_internal
dns_group = internal
generation = 1
servers = DnsServersList { addresses: [[::1]:37132] }
|
2104 | 2024-10-09T22:52:16.837Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 194.239117ms
iteration = 3
status = {"generation":1,"server_results":{"[::1]:37132":{"Ok":null}}}
|
2105 | 2024-10-09T22:52:16.852Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2106 | 2024-10-09T22:52:16.853Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
2107 | 2024-10-09T22:52:16.853Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2108 | 2024-10-09T22:52:16.853Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2109 | 2024-10-09T22:52:16.854Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2110 | 2024-10-09T22:52:16.855Z | DEBG | test_utilization (BackgroundTasks): begin collection
background_task = inventory_collection
|
2111 | 2024-10-09T22:52:16.855Z | DEBG | test_utilization (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:55029
|
2112 | 2024-10-09T22:52:16.855Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/ignition
|
2113 | 2024-10-09T22:52:16.856Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2114 | 2024-10-09T22:52:16.856Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2115 | 2024-10-09T22:52:16.856Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2116 | 2024-10-09T22:52:16.857Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2117 | 2024-10-09T22:52:16.858Z | DEBG | test_utilization (BackgroundTasks): found all DNS names for zone
background_task = dns_config_external
dns_group = external
dns_zone_id = cd840f04-1f41-4bd2-93be-21ddc45f211a
dns_zone_name = oxide-dev.test
found_so_far = 1
version = 2
|
2118 | 2024-10-09T22:52:16.858Z | DEBG | test_utilization (BackgroundTasks): read DNS config
background_task = dns_config_external
dns_group = external
nzones = 1
version = 2
|
2119 | 2024-10-09T22:52:16.858Z | INFO | test_utilization (BackgroundTasks): found latest generation (first find)
background_task = dns_config_external
dns_group = external
generation = 2
|
2120 | 2024-10-09T22:52:16.858Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 315.642616ms
iteration = 2
status = {"generation":2}
|
2121 | 2024-10-09T22:52:16.858Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 3
reason = Dependency
|
2122 | 2024-10-09T22:52:16.912Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = dns_propagation_external
body = Some(Body)
dns_group = external
dns_server_url = http://[::1]:53582
generation = 2
method = PUT
servers = DnsServersList { addresses: [[::1]:53582] }
uri = http://[::1]:53582/config
|
2123 | 2024-10-09T22:52:16.913Z | INFO | test_utilization (BackgroundTasks): found Silo/DNS/TLS config (initial)
background_task = external_endpoints
config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2024-10-09T22:52:08.187636Z, time_modified: 2024-10-09T22:52:08.187636Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, db_silo: Silo { identity: SiloIdentity { id: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:52:15.993064Z, time_modified: 2024-10-09T22:52:15.993064Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, db_silo: Silo { identity: SiloIdentity { id: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:52:15.993064Z, time_modified: 2024-10-09T22:52:15.993064Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
|
2124 | 2024-10-09T22:52:16.913Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 370.38272ms
iteration = 2
status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"9c1defc9-b8dc-4eb6-acde-8c84570c6637","tls_certs":[]}},"default_endpoint":{"silo_id":"9c1defc9-b8dc-4eb6-acde-8c84570c6637","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 9c1defc9-b8dc-4eb6-acde-8c84570c6637 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
|
2125 | 2024-10-09T22:52:16.914Z | INFO | test_utilization (http): accepted connection
kind = dns
local_addr = [::1]:53582
remote_addr = [::1]:45420
|
2126 | 2024-10-09T22:52:16.915Z | TRAC | test_utilization (http): incoming request
kind = dns
local_addr = [::1]:53582
method = PUT
remote_addr = [::1]:45420
req_id = 30d266e1-fe78-4575-ac5a-2bc6a20d1dee
uri = /config
|
2127 | 2024-10-09T22:52:16.915Z | INFO | test_utilization (store): attempting generation update
new_generation = 2
req_id = 30d266e1-fe78-4575-ac5a-2bc6a20d1dee
|
2128 | 2024-10-09T22:52:16.915Z | INFO | test_utilization (store): pruning trees for generations newer than 0
|
2129 | 2024-10-09T22:52:16.915Z | DEBG | test_utilization (store): creating tree
tree_name = generation_2_zone_oxide-dev.test
|
2130 | 2024-10-09T22:52:16.916Z | DEBG | test_utilization (store): updating current config
|
2131 | 2024-10-09T22:52:16.917Z | DEBG | test_utilization (store): flushing default tree
|
2132 | 2024-10-09T22:52:16.918Z | INFO | test_utilization (store): pruning trees for generations older than 2
keep = 3
|
2133 | 2024-10-09T22:52:16.918Z | INFO | test_utilization (store): updated generation
new_generation = 2
req_id = 30d266e1-fe78-4575-ac5a-2bc6a20d1dee
|
2134 | 2024-10-09T22:52:16.918Z | INFO | test_utilization (http): request completed
kind = dns
latency_us = 3220
local_addr = [::1]:53582
method = PUT
remote_addr = [::1]:45420
req_id = 30d266e1-fe78-4575-ac5a-2bc6a20d1dee
response_code = 204
uri = /config
|
2135 | 2024-10-09T22:52:16.918Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2136 | 2024-10-09T22:52:16.918Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2137 | 2024-10-09T22:52:16.918Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2138 | 2024-10-09T22:52:16.919Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2139 | 2024-10-09T22:52:16.919Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:53582
generation = 2
result = Ok(Response { url: "http://[::1]:53582/config", status: 204, headers: {"x-request-id": "30d266e1-fe78-4575-ac5a-2bc6a20d1dee", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
servers = DnsServersList { addresses: [[::1]:53582] }
|
2140 | 2024-10-09T22:52:16.919Z | INFO | test_utilization (BackgroundTasks): DNS server now at generation 2
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:53582
generation = 2
servers = DnsServersList { addresses: [[::1]:53582] }
|
2141 | 2024-10-09T22:52:16.921Z | INFO | test_utilization (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_external
dns_group = external
generation = 2
servers = DnsServersList { addresses: [[::1]:53582] }
|
2142 | 2024-10-09T22:52:16.921Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 63.013699ms
iteration = 3
status = {"generation":2,"server_results":{"[::1]:53582":{"Ok":null}}}
|
2143 | 2024-10-09T22:52:16.921Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "e42ddb7d-9e1b-459e-bb40-e0d200873b4f", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2144 | 2024-10-09T22:52:16.922Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0
|
2145 | 2024-10-09T22:52:16.924Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2146 | 2024-10-09T22:52:16.931Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
2147 | 2024-10-09T22:52:16.931Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
2148 | 2024-10-09T22:52:16.931Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
2149 | 2024-10-09T22:52:16.931Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2150 | 2024-10-09T22:52:16.931Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2151 | 2024-10-09T22:52:16.932Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2152 | 2024-10-09T22:52:16.932Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2153 | 2024-10-09T22:52:16.932Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "502368ea-bae2-4ef1-aab4-89762f618460", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2154 | 2024-10-09T22:52:16.933Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/sp/caboose?firmware_slot=0
|
2155 | 2024-10-09T22:52:16.934Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2156 | 2024-10-09T22:52:16.934Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2157 | 2024-10-09T22:52:16.934Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2158 | 2024-10-09T22:52:16.935Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2159 | 2024-10-09T22:52:16.936Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ae793595-7eaf-4c96-a938-b950d959e63f", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2160 | 2024-10-09T22:52:16.936Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/sp/caboose?firmware_slot=1
|
2161 | 2024-10-09T22:52:16.937Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2162 | 2024-10-09T22:52:16.937Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2163 | 2024-10-09T22:52:16.937Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2164 | 2024-10-09T22:52:16.937Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2165 | 2024-10-09T22:52:16.939Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2166 | 2024-10-09T22:52:16.946Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
2167 | 2024-10-09T22:52:16.946Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2168 | 2024-10-09T22:52:16.946Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2169 | 2024-10-09T22:52:16.947Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2170 | 2024-10-09T22:52:16.947Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "af728290-0de7-49ba-8816-794529c22db5", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2171 | 2024-10-09T22:52:16.947Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/caboose?firmware_slot=0
|
2172 | 2024-10-09T22:52:16.950Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2173 | 2024-10-09T22:52:16.950Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2174 | 2024-10-09T22:52:16.950Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2175 | 2024-10-09T22:52:16.950Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "badc5dcb-2d44-4fd4-8bf2-2867868ce8fd", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2176 | 2024-10-09T22:52:16.950Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/caboose?firmware_slot=1
|
2177 | 2024-10-09T22:52:16.952Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "60613940-0c4b-40e5-a3ad-816fc6b9edd5", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2178 | 2024-10-09T22:52:16.952Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
2179 | 2024-10-09T22:52:16.953Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2180 | 2024-10-09T22:52:16.953Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2181 | 2024-10-09T22:52:16.953Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2182 | 2024-10-09T22:52:16.955Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5fc09d5-a40c-46e8-b2d5-3b132f81aaf7", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2183 | 2024-10-09T22:52:16.955Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
2184 | 2024-10-09T22:52:16.955Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2185 | 2024-10-09T22:52:16.955Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2186 | 2024-10-09T22:52:16.956Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2187 | 2024-10-09T22:52:16.958Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
2188 | 2024-10-09T22:52:16.958Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2189 | 2024-10-09T22:52:16.958Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2190 | 2024-10-09T22:52:16.958Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2191 | 2024-10-09T22:52:16.958Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2192 | 2024-10-09T22:52:16.959Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3fb5b793-073c-4e00-aed7-875593c0f804", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2193 | 2024-10-09T22:52:16.959Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/cmpa
|
2194 | 2024-10-09T22:52:16.960Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0c1638aa-7d38-456a-a6f1-4e553b808a14", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2195 | 2024-10-09T22:52:16.960Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/cfpa
|
2196 | 2024-10-09T22:52:16.961Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2197 | 2024-10-09T22:52:16.961Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2198 | 2024-10-09T22:52:16.961Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2199 | 2024-10-09T22:52:16.961Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2200 | 2024-10-09T22:52:16.963Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7f7453b-1e05-464f-ba9d-31294995c705", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2201 | 2024-10-09T22:52:16.963Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/cfpa
|
2202 | 2024-10-09T22:52:16.964Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2203 | 2024-10-09T22:52:16.964Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2204 | 2024-10-09T22:52:16.964Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2205 | 2024-10-09T22:52:16.964Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2206 | 2024-10-09T22:52:16.965Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bef49554-baab-4b68-a600-7078b1f3e723", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2207 | 2024-10-09T22:52:16.965Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/rot/cfpa
|
2208 | 2024-10-09T22:52:16.979Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2209 | 2024-10-09T22:52:16.987Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
2210 | 2024-10-09T22:52:16.987Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
2211 | 2024-10-09T22:52:16.987Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2212 | 2024-10-09T22:52:16.987Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2213 | 2024-10-09T22:52:16.987Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2214 | 2024-10-09T22:52:16.989Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b294169b-8217-4ead-b5f8-346818b2d50b", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2215 | 2024-10-09T22:52:16.989Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1
|
2216 | 2024-10-09T22:52:16.990Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2217 | 2024-10-09T22:52:16.990Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2218 | 2024-10-09T22:52:16.990Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2219 | 2024-10-09T22:52:16.991Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c66a578d-4a15-4186-a638-5a448fd5a720", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2220 | 2024-10-09T22:52:16.992Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/sp/caboose?firmware_slot=0
|
2221 | 2024-10-09T22:52:16.992Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2222 | 2024-10-09T22:52:16.992Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2223 | 2024-10-09T22:52:16.993Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2224 | 2024-10-09T22:52:16.994Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "99840d9a-9bd7-48f5-8ef7-fb57237dac90", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2225 | 2024-10-09T22:52:16.994Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/sp/caboose?firmware_slot=1
|
2226 | 2024-10-09T22:52:16.995Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2227 | 2024-10-09T22:52:16.995Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2228 | 2024-10-09T22:52:16.995Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2229 | 2024-10-09T22:52:16.998Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9f89071c-768b-4494-832b-8cf730941515", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2230 | 2024-10-09T22:52:16.998Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/caboose?firmware_slot=0
|
2231 | 2024-10-09T22:52:16.998Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
2232 | 2024-10-09T22:52:16.999Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2233 | 2024-10-09T22:52:16.999Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2234 | 2024-10-09T22:52:16.999Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2235 | 2024-10-09T22:52:16.999Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2236 | 2024-10-09T22:52:17.002Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "04564db4-2711-4c65-b36a-46b1b670d0af", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2237 | 2024-10-09T22:52:17.002Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/caboose?firmware_slot=1
|
2238 | 2024-10-09T22:52:17.002Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2239 | 2024-10-09T22:52:17.002Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2240 | 2024-10-09T22:52:17.002Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2241 | 2024-10-09T22:52:17.003Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2242 | 2024-10-09T22:52:17.013Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2243 | 2024-10-09T22:52:17.013Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2244 | 2024-10-09T22:52:17.013Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2245 | 2024-10-09T22:52:17.013Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2246 | 2024-10-09T22:52:17.013Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "63dc04cf-defc-41f2-ba80-c201af1e5476", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2247 | 2024-10-09T22:52:17.014Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
2248 | 2024-10-09T22:52:17.015Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c7170ba7-fcce-4c4b-9d3b-7b8ac282d0ac", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2249 | 2024-10-09T22:52:17.015Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
2250 | 2024-10-09T22:52:17.015Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2251 | 2024-10-09T22:52:17.022Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
2252 | 2024-10-09T22:52:17.022Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
2253 | 2024-10-09T22:52:17.022Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
2254 | 2024-10-09T22:52:17.022Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2255 | 2024-10-09T22:52:17.022Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2256 | 2024-10-09T22:52:17.023Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2257 | 2024-10-09T22:52:17.023Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2258 | 2024-10-09T22:52:17.028Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2259 | 2024-10-09T22:52:17.028Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2260 | 2024-10-09T22:52:17.028Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2261 | 2024-10-09T22:52:17.029Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2262 | 2024-10-09T22:52:17.037Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2263 | 2024-10-09T22:52:17.037Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2264 | 2024-10-09T22:52:17.037Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2265 | 2024-10-09T22:52:17.037Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2266 | 2024-10-09T22:52:17.048Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2267 | 2024-10-09T22:52:17.055Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
2268 | 2024-10-09T22:52:17.055Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2269 | 2024-10-09T22:52:17.055Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2270 | 2024-10-09T22:52:17.056Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2271 | 2024-10-09T22:52:17.057Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "473240ba-b04d-4c96-acaf-899c2a3f2e19", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2272 | 2024-10-09T22:52:17.057Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/cmpa
|
2273 | 2024-10-09T22:52:17.063Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2274 | 2024-10-09T22:52:17.063Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2275 | 2024-10-09T22:52:17.064Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2276 | 2024-10-09T22:52:17.065Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "710457b0-f165-4a34-a14b-ffa6949ce52f", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2277 | 2024-10-09T22:52:17.065Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/cfpa
|
2278 | 2024-10-09T22:52:17.075Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ab42b755-58b0-4ee2-9b2c-34f847392978", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2279 | 2024-10-09T22:52:17.075Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/cfpa
|
2280 | 2024-10-09T22:52:17.075Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2281 | 2024-10-09T22:52:17.075Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2282 | 2024-10-09T22:52:17.076Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2283 | 2024-10-09T22:52:17.077Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d2695124-e139-4301-81aa-ec27b4b50b79", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2284 | 2024-10-09T22:52:17.078Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/1/component/rot/cfpa
|
2285 | 2024-10-09T22:52:17.079Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "7da41df8-2089-4ddd-9bcb-e60523b9db2f", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2286 | 2024-10-09T22:52:17.079Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0
|
2287 | 2024-10-09T22:52:17.079Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2288 | 2024-10-09T22:52:17.079Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2289 | 2024-10-09T22:52:17.080Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2290 | 2024-10-09T22:52:17.082Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "50483af4-6d22-42b2-a5e7-a197fa72d533", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2291 | 2024-10-09T22:52:17.083Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/sp/caboose?firmware_slot=0
|
2292 | 2024-10-09T22:52:17.083Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2293 | 2024-10-09T22:52:17.083Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2294 | 2024-10-09T22:52:17.084Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2295 | 2024-10-09T22:52:17.086Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
2296 | 2024-10-09T22:52:17.086Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2297 | 2024-10-09T22:52:17.086Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2298 | 2024-10-09T22:52:17.086Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2299 | 2024-10-09T22:52:17.087Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2300 | 2024-10-09T22:52:17.087Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e5cc6ef-ac2d-4fe0-a17c-fb90f475f0d9", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2301 | 2024-10-09T22:52:17.088Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/sp/caboose?firmware_slot=1
|
2302 | 2024-10-09T22:52:17.089Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2303 | 2024-10-09T22:52:17.089Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2304 | 2024-10-09T22:52:17.089Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2305 | 2024-10-09T22:52:17.090Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2306 | 2024-10-09T22:52:17.092Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "58f07096-114c-492e-98cd-ab9cc4eb3848", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2307 | 2024-10-09T22:52:17.092Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/caboose?firmware_slot=0
|
2308 | 2024-10-09T22:52:17.093Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2309 | 2024-10-09T22:52:17.093Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2310 | 2024-10-09T22:52:17.093Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2311 | 2024-10-09T22:52:17.103Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2312 | 2024-10-09T22:52:17.105Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c4878f6e-9be5-4a89-83d4-cf694bf4cb7d", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2313 | 2024-10-09T22:52:17.105Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/caboose?firmware_slot=1
|
2314 | 2024-10-09T22:52:17.107Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2315 | 2024-10-09T22:52:17.116Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
2316 | 2024-10-09T22:52:17.116Z | TRAC | test_utilization (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
2317 | 2024-10-09T22:52:17.116Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
2318 | 2024-10-09T22:52:17.116Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2319 | 2024-10-09T22:52:17.117Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2320 | 2024-10-09T22:52:17.117Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2321 | 2024-10-09T22:52:17.117Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2322 | 2024-10-09T22:52:17.119Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d37b2d5a-6940-47c9-b544-6f1bd49ed93e", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2323 | 2024-10-09T22:52:17.119Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
2324 | 2024-10-09T22:52:17.119Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2325 | 2024-10-09T22:52:17.119Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2326 | 2024-10-09T22:52:17.119Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2327 | 2024-10-09T22:52:17.120Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2328 | 2024-10-09T22:52:17.122Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2329 | 2024-10-09T22:52:17.122Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2330 | 2024-10-09T22:52:17.123Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2331 | 2024-10-09T22:52:17.123Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2332 | 2024-10-09T22:52:17.124Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "030a1e0b-8ab3-4ff4-bd3e-69d9c434be36", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2333 | 2024-10-09T22:52:17.124Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
2334 | 2024-10-09T22:52:17.126Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2335 | 2024-10-09T22:52:17.141Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
2336 | 2024-10-09T22:52:17.141Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2337 | 2024-10-09T22:52:17.141Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2338 | 2024-10-09T22:52:17.142Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2339 | 2024-10-09T22:52:17.161Z | DEBG | test_utilization (InternalApi): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("nexus"): [NetworkInterface { id: eda79658-0739-4511-858a-4bfd5f366820, kind: Service { id: 16bcf290-d2b8-479e-aae0-2fceec228e77 }, name: Name("nexus-16bcf290-d2b8-479e-aae0-2fceec228e77"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("external-dns"): [NetworkInterface { id: 855938d6-c6ba-4ca5-8a05-fa6126681555, kind: Service { id: c1af2954-8494-4f05-af95-e3cb4f5ecdb4 }, name: Name("external-dns-c1af2954-8494-4f05-af95-e3cb4f5ecdb4"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
2340 | 2024-10-09T22:52:17.161Z | TRAC | test_utilization (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
2341 | 2024-10-09T22:52:17.161Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2342 | 2024-10-09T22:52:17.161Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2343 | 2024-10-09T22:52:17.161Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2344 | 2024-10-09T22:52:17.162Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2345 | 2024-10-09T22:52:17.168Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2346 | 2024-10-09T22:52:17.172Z | DEBG | test_utilization (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
2347 | 2024-10-09T22:52:17.172Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2348 | 2024-10-09T22:52:17.172Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2349 | 2024-10-09T22:52:17.173Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2350 | 2024-10-09T22:52:17.174Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "eb2fe147-7122-4f40-bef9-afe1f168aede", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2351 | 2024-10-09T22:52:17.174Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/cmpa
|
2352 | 2024-10-09T22:52:17.176Z | TRAC | test_utilization (InternalApi): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:52:16.183775Z, allowed_ips: None }
|
2353 | 2024-10-09T22:52:17.176Z | DEBG | test_utilization (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
2354 | 2024-10-09T22:52:17.176Z | DEBG | test_utilization (InternalApi): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 855938d6-c6ba-4ca5-8a05-fa6126681555, kind: Service { id: c1af2954-8494-4f05-af95-e3cb4f5ecdb4 }, name: Name("external-dns-c1af2954-8494-4f05-af95-e3cb4f5ecdb4"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: eda79658-0739-4511-858a-4bfd5f366820, kind: Service { id: 16bcf290-d2b8-479e-aae0-2fceec228e77 }, name: Name("nexus-16bcf290-d2b8-479e-aae0-2fceec228e77"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
|
2355 | 2024-10-09T22:52:17.176Z | DEBG | test_utilization (InternalApi): resolved 2 rules for sleds
|
2356 | 2024-10-09T22:52:17.179Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "91049883-248c-4232-9a40-2dada0993635", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2357 | 2024-10-09T22:52:17.179Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/cfpa
|
2358 | 2024-10-09T22:52:17.201Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6c373d5b-5f52-440f-864f-9516970901ad", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2359 | 2024-10-09T22:52:17.201Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/cfpa
|
2360 | 2024-10-09T22:52:17.203Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0df72c36-8af3-444d-ba4e-ad740fa27fd8", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2361 | 2024-10-09T22:52:17.203Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/0/component/rot/cfpa
|
2362 | 2024-10-09T22:52:17.204Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d94dbae5-82a2-4233-b615-e9ac575e243f", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2363 | 2024-10-09T22:52:17.204Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1
|
2364 | 2024-10-09T22:52:17.205Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a12e2303-5bcc-456d-b20d-dbf367bbb312", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2365 | 2024-10-09T22:52:17.205Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/sp/caboose?firmware_slot=0
|
2366 | 2024-10-09T22:52:17.209Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4b02b903-f9eb-4a02-85cc-57633777a9ac", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2367 | 2024-10-09T22:52:17.209Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/sp/caboose?firmware_slot=1
|
2368 | 2024-10-09T22:52:17.211Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3760ee77-bea6-4035-bb1b-6fe8195beaf5", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2369 | 2024-10-09T22:52:17.211Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/caboose?firmware_slot=0
|
2370 | 2024-10-09T22:52:17.214Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c644d384-1fae-4aff-b40f-58d3cbf27b8c", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2371 | 2024-10-09T22:52:17.214Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/caboose?firmware_slot=1
|
2372 | 2024-10-09T22:52:17.216Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e574d900-258c-4faa-bd2b-7b6021abcf67", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2373 | 2024-10-09T22:52:17.216Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
2374 | 2024-10-09T22:52:17.218Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2bcc6f3c-0d37-4488-94b3-b7ac712c63f0", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2375 | 2024-10-09T22:52:17.218Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
2376 | 2024-10-09T22:52:17.220Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "88ab1d9a-4d06-4934-bb5e-4fdcd894c443", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2377 | 2024-10-09T22:52:17.220Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/cmpa
|
2378 | 2024-10-09T22:52:17.222Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "52e93b32-aeb3-402d-a036-4f0afc5de3cc", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2379 | 2024-10-09T22:52:17.222Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/cfpa
|
2380 | 2024-10-09T22:52:17.223Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b8fa277-eebf-48b1-9059-374bfeb184fe", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2381 | 2024-10-09T22:52:17.224Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/cfpa
|
2382 | 2024-10-09T22:52:17.225Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3859e52c-31dc-45b9-9fa9-20684c1e8dc9", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2383 | 2024-10-09T22:52:17.226Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/sled/1/component/rot/cfpa
|
2384 | 2024-10-09T22:52:17.227Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "39d9397e-c0c8-4624-93f2-dc32dfa3a5be", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2385 | 2024-10-09T22:52:17.227Z | DEBG | test_utilization (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:59689
|
2386 | 2024-10-09T22:52:17.227Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59689
method = GET
uri = http://[::1]:59689/ignition
|
2387 | 2024-10-09T22:52:17.229Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59689
result = Ok(Response { url: "http://[::1]:59689/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "cce8a302-7eba-4ef3-bc78-eb5c64a049b7", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2388 | 2024-10-09T22:52:17.230Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59689
method = GET
uri = http://[::1]:59689/sp/switch/0
|
2389 | 2024-10-09T22:52:17.231Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59689
result = Ok(Response { url: "http://[::1]:59689/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "34c09c76-7aec-4a72-9ba6-dd94c5cd5f83", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2390 | 2024-10-09T22:52:17.232Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59689
method = GET
uri = http://[::1]:59689/sp/switch/1
|
2391 | 2024-10-09T22:52:17.233Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59689
result = Ok(Response { url: "http://[::1]:59689/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "70fa90fa-0df1-4d84-addd-8c40cc104b6f", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2392 | 2024-10-09T22:52:17.233Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59689
method = GET
uri = http://[::1]:59689/sp/sled/0
|
2393 | 2024-10-09T22:52:17.236Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59689
result = Ok(Response { url: "http://[::1]:59689/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0ec4c73d-1fdf-4dec-9f81-300536ee381c", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2394 | 2024-10-09T22:52:17.236Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59689
method = GET
uri = http://[::1]:59689/sp/sled/1
|
2395 | 2024-10-09T22:52:17.236Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59689
result = Ok(Response { url: "http://[::1]:59689/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "a6be8193-fae1-4691-ad0b-81955bb4f560", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2396 | 2024-10-09T22:52:17.241Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
2397 | 2024-10-09T22:52:17.242Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2398 | 2024-10-09T22:52:17.242Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2399 | 2024-10-09T22:52:17.242Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2400 | 2024-10-09T22:52:17.243Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2401 | 2024-10-09T22:52:17.252Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2402 | 2024-10-09T22:52:17.260Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
2403 | 2024-10-09T22:52:17.261Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
2404 | 2024-10-09T22:52:17.261Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2405 | 2024-10-09T22:52:17.261Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2406 | 2024-10-09T22:52:17.261Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2407 | 2024-10-09T22:52:17.262Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2408 | 2024-10-09T22:52:17.267Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2409 | 2024-10-09T22:52:17.272Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
2410 | 2024-10-09T22:52:17.273Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2411 | 2024-10-09T22:52:17.273Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2412 | 2024-10-09T22:52:17.273Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2413 | 2024-10-09T22:52:17.343Z | DEBG | test_utilization (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:56969
|
2414 | 2024-10-09T22:52:17.343Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = http://[::1]:56969
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:56969/inventory
|
2415 | 2024-10-09T22:52:17.343Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:56969
remote_addr = [::1]:63281
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
2416 | 2024-10-09T22:52:17.343Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63281
req_id = a4974686-a3ff-4302-af6c-e572ba66d94a
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /inventory
|
2417 | 2024-10-09T22:52:17.344Z | INFO | test_utilization (dropshot): request completed
latency_us = 557
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63281
req_id = a4974686-a3ff-4302-af6c-e572ba66d94a
response_code = 200
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /inventory
|
2418 | 2024-10-09T22:52:17.344Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = http://[::1]:56969
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:56969/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4974686-a3ff-4302-af6c-e572ba66d94a", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2419 | 2024-10-09T22:52:17.349Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = http://[::1]:56969
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:56969/omicron-zones
|
2420 | 2024-10-09T22:52:17.350Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63281
req_id = 0ee75eb5-ca03-43fd-91bb-9e48be92a38a
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /omicron-zones
|
2421 | 2024-10-09T22:52:17.350Z | INFO | test_utilization (dropshot): request completed
latency_us = 220
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:63281
req_id = 0ee75eb5-ca03-43fd-91bb-9e48be92a38a
response_code = 200
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /omicron-zones
|
2422 | 2024-10-09T22:52:17.350Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = http://[::1]:56969
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:56969/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "0ee75eb5-ca03-43fd-91bb-9e48be92a38a", "content-length": "27", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2423 | 2024-10-09T22:52:17.402Z | DEBG | test_utilization (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:41369
|
2424 | 2024-10-09T22:52:17.402Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = http://[::1]:41369
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:41369/inventory
|
2425 | 2024-10-09T22:52:17.402Z | DEBG | test_utilization (InternalApi): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:52:11.138627Z, time_modified: 2024-10-09T22:52:11.138627Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(41369), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
|
2426 | 2024-10-09T22:52:17.402Z | DEBG | test_utilization (InternalApi): sending firewall rules to sled agents
|
2427 | 2024-10-09T22:52:17.402Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2428 | 2024-10-09T22:52:17.402Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2429 | 2024-10-09T22:52:17.403Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2430 | 2024-10-09T22:52:17.403Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:35084
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
2431 | 2024-10-09T22:52:17.404Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:35084
req_id = b43a1e45-32c8-4c4c-ad90-9942ba6e3fea
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
2432 | 2024-10-09T22:52:17.405Z | INFO | test_utilization (dropshot): request completed
latency_us = 777
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:35084
req_id = b43a1e45-32c8-4c4c-ad90-9942ba6e3fea
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
2433 | 2024-10-09T22:52:17.406Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = http://[::1]:41369
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:41369/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "b43a1e45-32c8-4c4c-ad90-9942ba6e3fea", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2434 | 2024-10-09T22:52:17.406Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = http://[::1]:41369
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:41369/omicron-zones
|
2435 | 2024-10-09T22:52:17.407Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:35084
req_id = e0f924da-127a-4b21-93a1-d465ce3ba497
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
2436 | 2024-10-09T22:52:17.407Z | INFO | test_utilization (dropshot): request completed
latency_us = 297
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:35084
req_id = e0f924da-127a-4b21-93a1-d465ce3ba497
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
2437 | 2024-10-09T22:52:17.407Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = http://[::1]:41369
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:41369/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0f924da-127a-4b21-93a1-d465ce3ba497", "content-length": "2268", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2438 | 2024-10-09T22:52:17.412Z | DEBG | test_utilization (BackgroundTasks): finished collection
background_task = inventory_collection
|
2439 | 2024-10-09T22:52:17.412Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
2440 | 2024-10-09T22:52:17.412Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2441 | 2024-10-09T22:52:17.413Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2442 | 2024-10-09T22:52:17.414Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2443 | 2024-10-09T22:52:17.418Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2444 | 2024-10-09T22:52:17.419Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
2445 | 2024-10-09T22:52:17.419Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2446 | 2024-10-09T22:52:17.419Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2447 | 2024-10-09T22:52:17.419Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2448 | 2024-10-09T22:52:17.420Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2449 | 2024-10-09T22:52:17.423Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2450 | 2024-10-09T22:52:17.429Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
2451 | 2024-10-09T22:52:17.442Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2452 | 2024-10-09T22:52:17.442Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2453 | 2024-10-09T22:52:17.444Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2454 | 2024-10-09T22:52:17.444Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2455 | 2024-10-09T22:52:17.451Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
2456 | 2024-10-09T22:52:17.504Z | DEBG | test_utilization (InternalApi): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:41369/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2457 | 2024-10-09T22:52:17.505Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:52222
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
2458 | 2024-10-09T22:52:17.506Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:52222
req_id = 5ba6593e-2ee5-4214-9e93-42ef2323c505
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2459 | 2024-10-09T22:52:17.506Z | INFO | test_utilization (dropshot): request completed
latency_us = 648
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:52222
req_id = 5ba6593e-2ee5-4214-9e93-42ef2323c505
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2460 | 2024-10-09T22:52:17.506Z | DEBG | test_utilization (InternalApi): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:41369/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "5ba6593e-2ee5-4214-9e93-42ef2323c505", "date": "Wed, 09 Oct 2024 22:52:16 GMT"} })
|
2461 | 2024-10-09T22:52:17.508Z | INFO | test_utilization (InternalApi): updated firewall rules on 1 sleds
|
2462 | 2024-10-09T22:52:17.508Z | INFO | test_utilization (nexus): plumbed initial IP allowlist
|
2463 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /
|
2464 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /access
|
2465 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /assets/{path}
|
2466 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /device/auth
|
2467 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /device/confirm
|
2468 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /device/success
|
2469 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /device/token
|
2470 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /device/verify
|
2471 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /experimental/v1/probes
|
2472 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /experimental/v1/probes
|
2473 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /experimental/v1/probes/{probe}
|
2474 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /experimental/v1/probes/{probe}
|
2475 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /images
|
2476 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /login
|
2477 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /login/{silo_name}/local
|
2478 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /login/{silo_name}/saml/{provider_name}
|
2479 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /login/{silo_name}/saml/{provider_name}
|
2480 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
|
2481 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /lookup/{path}
|
2482 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /projects/{path}
|
2483 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /projects-new
|
2484 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /settings/{path}
|
2485 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /system/{path}
|
2486 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /utilization
|
2487 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/certificates
|
2488 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/certificates
|
2489 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/certificates/{certificate}
|
2490 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/certificates/{certificate}
|
2491 | 2024-10-09T22:52:17.540Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/disks
|
2492 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/disks
|
2493 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/disks/{disk}
|
2494 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/disks/{disk}
|
2495 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/disks/{disk}/bulk-write
|
2496 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/disks/{disk}/bulk-write-start
|
2497 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/disks/{disk}/bulk-write-stop
|
2498 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/disks/{disk}/finalize
|
2499 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/disks/{disk}/metrics/{metric}
|
2500 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/floating-ips
|
2501 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/floating-ips
|
2502 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/floating-ips/{floating_ip}
|
2503 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/floating-ips/{floating_ip}
|
2504 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/floating-ips/{floating_ip}
|
2505 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/floating-ips/{floating_ip}/attach
|
2506 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/floating-ips/{floating_ip}/detach
|
2507 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/groups
|
2508 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/groups/{group_id}
|
2509 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/images
|
2510 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/images
|
2511 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/images/{image}
|
2512 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/images/{image}
|
2513 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/images/{image}/demote
|
2514 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/images/{image}/promote
|
2515 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances
|
2516 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances
|
2517 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/instances/{instance}
|
2518 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}
|
2519 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/instances/{instance}
|
2520 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}/disks
|
2521 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/disks/attach
|
2522 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/disks/detach
|
2523 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}/external-ips
|
2524 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
|
2525 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
|
2526 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/reboot
|
2527 | 2024-10-09T22:52:17.541Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}/serial-console
|
2528 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}/serial-console/stream
|
2529 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/instances/{instance}/ssh-public-keys
|
2530 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/start
|
2531 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/instances/{instance}/stop
|
2532 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/internet-gateway-ip-addresses
|
2533 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/internet-gateway-ip-addresses
|
2534 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
|
2535 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/internet-gateway-ip-pools
|
2536 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/internet-gateway-ip-pools
|
2537 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
|
2538 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/internet-gateways
|
2539 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/internet-gateways
|
2540 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/internet-gateways/{gateway}
|
2541 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/internet-gateways/{gateway}
|
2542 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/ip-pools
|
2543 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/ip-pools/{pool}
|
2544 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/login/{silo_name}/local
|
2545 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/logout
|
2546 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/me
|
2547 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/me/groups
|
2548 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/me/ssh-keys
|
2549 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/me/ssh-keys
|
2550 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
|
2551 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/me/ssh-keys/{ssh_key}
|
2552 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/metrics/{metric_name}
|
2553 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/network-interfaces
|
2554 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/network-interfaces
|
2555 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/network-interfaces/{interface}
|
2556 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/network-interfaces/{interface}
|
2557 | 2024-10-09T22:52:17.542Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/network-interfaces/{interface}
|
2558 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/ping
|
2559 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/policy
|
2560 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/policy
|
2561 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/projects
|
2562 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/projects
|
2563 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/projects/{project}
|
2564 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/projects/{project}
|
2565 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/projects/{project}
|
2566 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/projects/{project}/policy
|
2567 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/projects/{project}/policy
|
2568 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/snapshots
|
2569 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/snapshots
|
2570 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/snapshots/{snapshot}
|
2571 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/snapshots/{snapshot}
|
2572 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/disks
|
2573 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/disks/{disk_id}
|
2574 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/racks
|
2575 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/racks/{rack_id}
|
2576 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/sleds
|
2577 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/hardware/sleds
|
2578 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/sleds/{sled_id}
|
2579 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
|
2580 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
|
2581 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
|
2582 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/sleds-uninitialized
|
2583 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/switch-port
|
2584 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
|
2585 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
|
2586 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/switch-port/{port}/status
|
2587 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/switches
|
2588 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/hardware/switches/{switch_id}
|
2589 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/identity-providers
|
2590 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/identity-providers/local/users
|
2591 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
|
2592 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
|
2593 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/identity-providers/saml
|
2594 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/identity-providers/saml/{provider}
|
2595 | 2024-10-09T22:52:17.543Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools
|
2596 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools
|
2597 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/ip-pools/{pool}
|
2598 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools/{pool}
|
2599 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/ip-pools/{pool}
|
2600 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools/{pool}/ranges
|
2601 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
|
2602 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
|
2603 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools/{pool}/silos
|
2604 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools/{pool}/silos
|
2605 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
|
2606 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
|
2607 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools/{pool}/utilization
|
2608 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools-service
|
2609 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/ip-pools-service/ranges
|
2610 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools-service/ranges/add
|
2611 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/ip-pools-service/ranges/remove
|
2612 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/metrics/{metric_name}
|
2613 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/address-lot
|
2614 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/address-lot
|
2615 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
|
2616 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
|
2617 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/allow-list
|
2618 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/networking/allow-list
|
2619 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/bfd-disable
|
2620 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/bfd-enable
|
2621 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bfd-status
|
2622 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/networking/bgp
|
2623 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp
|
2624 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/bgp
|
2625 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-announce-set
|
2626 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/networking/bgp-announce-set
|
2627 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
|
2628 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
|
2629 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-exported
|
2630 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-message-history
|
2631 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-routes-ipv4
|
2632 | 2024-10-09T22:52:17.544Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/bgp-status
|
2633 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/loopback-address
|
2634 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/loopback-address
|
2635 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
|
2636 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/networking/switch-port-settings
|
2637 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/switch-port-settings
|
2638 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/networking/switch-port-settings
|
2639 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/networking/switch-port-settings/{port}
|
2640 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/policy
|
2641 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/policy
|
2642 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/roles
|
2643 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/roles/{role_name}
|
2644 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silo-quotas
|
2645 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silos
|
2646 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/system/silos
|
2647 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/system/silos/{silo}
|
2648 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silos/{silo}
|
2649 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silos/{silo}/ip-pools
|
2650 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silos/{silo}/policy
|
2651 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/silos/{silo}/policy
|
2652 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/silos/{silo}/quotas
|
2653 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/silos/{silo}/quotas
|
2654 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/system/update/repository
|
2655 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/update/repository/{system_version}
|
2656 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/users
|
2657 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/users/{user_id}
|
2658 | 2024-10-09T22:52:17.545Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/users-builtin
|
2659 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/users-builtin/{user}
|
2660 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/utilization/silos
|
2661 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/system/utilization/silos/{silo}
|
2662 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/timeseries/query
|
2663 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/timeseries/schema
|
2664 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/users
|
2665 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/utilization
|
2666 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-firewall-rules
|
2667 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/vpc-firewall-rules
|
2668 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-router-routes
|
2669 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/vpc-router-routes
|
2670 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/vpc-router-routes/{route}
|
2671 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-router-routes/{route}
|
2672 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/vpc-router-routes/{route}
|
2673 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-routers
|
2674 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/vpc-routers
|
2675 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/vpc-routers/{router}
|
2676 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-routers/{router}
|
2677 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/vpc-routers/{router}
|
2678 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-subnets
|
2679 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/vpc-subnets
|
2680 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/vpc-subnets/{subnet}
|
2681 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-subnets/{subnet}
|
2682 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/vpc-subnets/{subnet}
|
2683 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
|
2684 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpcs
|
2685 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = POST
path = /v1/vpcs
|
2686 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = DELETE
path = /v1/vpcs/{vpc}
|
2687 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = GET
path = /v1/vpcs/{vpc}
|
2688 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): registered endpoint
local_addr = 127.0.0.1:39037
method = PUT
path = /v1/vpcs/{vpc}
|
2689 | 2024-10-09T22:52:17.546Z | INFO | test_utilization (dropshot_external): listening
local_addr = 127.0.0.1:39037
|
2690 | 2024-10-09T22:52:17.546Z | DEBG | test_utilization (dropshot_external): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:39037
|
2691 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /
|
2692 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /access
|
2693 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /assets/{path}
|
2694 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /device/auth
|
2695 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /device/confirm
|
2696 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /device/success
|
2697 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /device/token
|
2698 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /device/verify
|
2699 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /experimental/v1/probes
|
2700 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /experimental/v1/probes
|
2701 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /experimental/v1/probes/{probe}
|
2702 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /experimental/v1/probes/{probe}
|
2703 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /images
|
2704 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /login
|
2705 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /login/{silo_name}/local
|
2706 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /login/{silo_name}/saml/{provider_name}
|
2707 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /login/{silo_name}/saml/{provider_name}
|
2708 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
|
2709 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /lookup/{path}
|
2710 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /projects/{path}
|
2711 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /projects-new
|
2712 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /settings/{path}
|
2713 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /system/{path}
|
2714 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /utilization
|
2715 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/certificates
|
2716 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/certificates
|
2717 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/certificates/{certificate}
|
2718 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/certificates/{certificate}
|
2719 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/disks
|
2720 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/disks
|
2721 | 2024-10-09T22:52:17.573Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/disks/{disk}
|
2722 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/disks/{disk}
|
2723 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/disks/{disk}/bulk-write
|
2724 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/disks/{disk}/bulk-write-start
|
2725 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/disks/{disk}/bulk-write-stop
|
2726 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/disks/{disk}/finalize
|
2727 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/disks/{disk}/metrics/{metric}
|
2728 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/floating-ips
|
2729 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/floating-ips
|
2730 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/floating-ips/{floating_ip}
|
2731 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/floating-ips/{floating_ip}
|
2732 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/floating-ips/{floating_ip}
|
2733 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/floating-ips/{floating_ip}/attach
|
2734 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/floating-ips/{floating_ip}/detach
|
2735 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/groups
|
2736 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/groups/{group_id}
|
2737 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/images
|
2738 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/images
|
2739 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/images/{image}
|
2740 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/images/{image}
|
2741 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/images/{image}/demote
|
2742 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/images/{image}/promote
|
2743 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances
|
2744 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances
|
2745 | 2024-10-09T22:52:17.574Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/instances/{instance}
|
2746 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}
|
2747 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/instances/{instance}
|
2748 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}/disks
|
2749 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/disks/attach
|
2750 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/disks/detach
|
2751 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}/external-ips
|
2752 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
|
2753 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
|
2754 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/reboot
|
2755 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}/serial-console
|
2756 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}/serial-console/stream
|
2757 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/instances/{instance}/ssh-public-keys
|
2758 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/start
|
2759 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/instances/{instance}/stop
|
2760 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/internet-gateway-ip-addresses
|
2761 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/internet-gateway-ip-addresses
|
2762 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
|
2763 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/internet-gateway-ip-pools
|
2764 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/internet-gateway-ip-pools
|
2765 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
|
2766 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/internet-gateways
|
2767 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/internet-gateways
|
2768 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/internet-gateways/{gateway}
|
2769 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/internet-gateways/{gateway}
|
2770 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/ip-pools
|
2771 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/ip-pools/{pool}
|
2772 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/login/{silo_name}/local
|
2773 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/logout
|
2774 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/me
|
2775 | 2024-10-09T22:52:17.575Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/me/groups
|
2776 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/me/ssh-keys
|
2777 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/me/ssh-keys
|
2778 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
|
2779 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/me/ssh-keys/{ssh_key}
|
2780 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/metrics/{metric_name}
|
2781 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/network-interfaces
|
2782 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/network-interfaces
|
2783 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/network-interfaces/{interface}
|
2784 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/network-interfaces/{interface}
|
2785 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/network-interfaces/{interface}
|
2786 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/ping
|
2787 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/policy
|
2788 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/policy
|
2789 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/projects
|
2790 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/projects
|
2791 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/projects/{project}
|
2792 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/projects/{project}
|
2793 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/projects/{project}
|
2794 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/projects/{project}/policy
|
2795 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/projects/{project}/policy
|
2796 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/snapshots
|
2797 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/snapshots
|
2798 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/snapshots/{snapshot}
|
2799 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/snapshots/{snapshot}
|
2800 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/disks
|
2801 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/disks/{disk_id}
|
2802 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/racks
|
2803 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/racks/{rack_id}
|
2804 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/sleds
|
2805 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/hardware/sleds
|
2806 | 2024-10-09T22:52:17.576Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/sleds/{sled_id}
|
2807 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
|
2808 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
|
2809 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
|
2810 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/sleds-uninitialized
|
2811 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/switch-port
|
2812 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
|
2813 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
|
2814 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/switch-port/{port}/status
|
2815 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/switches
|
2816 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/hardware/switches/{switch_id}
|
2817 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/identity-providers
|
2818 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/identity-providers/local/users
|
2819 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
|
2820 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
|
2821 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/identity-providers/saml
|
2822 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/identity-providers/saml/{provider}
|
2823 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools
|
2824 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools
|
2825 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/ip-pools/{pool}
|
2826 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools/{pool}
|
2827 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/ip-pools/{pool}
|
2828 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools/{pool}/ranges
|
2829 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
|
2830 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
|
2831 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools/{pool}/silos
|
2832 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools/{pool}/silos
|
2833 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
|
2834 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
|
2835 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools/{pool}/utilization
|
2836 | 2024-10-09T22:52:17.577Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools-service
|
2837 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/ip-pools-service/ranges
|
2838 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools-service/ranges/add
|
2839 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/ip-pools-service/ranges/remove
|
2840 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/metrics/{metric_name}
|
2841 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/address-lot
|
2842 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/address-lot
|
2843 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
|
2844 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
|
2845 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/allow-list
|
2846 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/networking/allow-list
|
2847 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/bfd-disable
|
2848 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/bfd-enable
|
2849 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bfd-status
|
2850 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/networking/bgp
|
2851 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp
|
2852 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/bgp
|
2853 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-announce-set
|
2854 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/networking/bgp-announce-set
|
2855 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
|
2856 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
|
2857 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-exported
|
2858 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-message-history
|
2859 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-routes-ipv4
|
2860 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/bgp-status
|
2861 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/loopback-address
|
2862 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/loopback-address
|
2863 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
|
2864 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/networking/switch-port-settings
|
2865 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/switch-port-settings
|
2866 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/networking/switch-port-settings
|
2867 | 2024-10-09T22:52:17.578Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/networking/switch-port-settings/{port}
|
2868 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/policy
|
2869 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/policy
|
2870 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/roles
|
2871 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/roles/{role_name}
|
2872 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silo-quotas
|
2873 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silos
|
2874 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/system/silos
|
2875 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/system/silos/{silo}
|
2876 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silos/{silo}
|
2877 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silos/{silo}/ip-pools
|
2878 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silos/{silo}/policy
|
2879 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/silos/{silo}/policy
|
2880 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/silos/{silo}/quotas
|
2881 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/silos/{silo}/quotas
|
2882 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/system/update/repository
|
2883 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/update/repository/{system_version}
|
2884 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/users
|
2885 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/users/{user_id}
|
2886 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/users-builtin
|
2887 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/users-builtin/{user}
|
2888 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/utilization/silos
|
2889 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/system/utilization/silos/{silo}
|
2890 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/timeseries/query
|
2891 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/timeseries/schema
|
2892 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/users
|
2893 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/utilization
|
2894 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-firewall-rules
|
2895 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/vpc-firewall-rules
|
2896 | 2024-10-09T22:52:17.579Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-router-routes
|
2897 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/vpc-router-routes
|
2898 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/vpc-router-routes/{route}
|
2899 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-router-routes/{route}
|
2900 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/vpc-router-routes/{route}
|
2901 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-routers
|
2902 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/vpc-routers
|
2903 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/vpc-routers/{router}
|
2904 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-routers/{router}
|
2905 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/vpc-routers/{router}
|
2906 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-subnets
|
2907 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/vpc-subnets
|
2908 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/vpc-subnets/{subnet}
|
2909 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-subnets/{subnet}
|
2910 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/vpc-subnets/{subnet}
|
2911 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
|
2912 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpcs
|
2913 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = POST
path = /v1/vpcs
|
2914 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = DELETE
path = /v1/vpcs/{vpc}
|
2915 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = GET
path = /v1/vpcs/{vpc}
|
2916 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:55865
method = PUT
path = /v1/vpcs/{vpc}
|
2917 | 2024-10-09T22:52:17.580Z | INFO | test_utilization (dropshot_external_techport): listening
local_addr = 127.0.0.1:55865
|
2918 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot_external_techport): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:55865
|
2919 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (nexus-producer-server): registered DTrace probes
|
2920 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = 127.0.0.1:48178
method = GET
path = /{producer_id}
|
2921 | 2024-10-09T22:52:17.580Z | INFO | test_utilization (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197
local_addr = 127.0.0.1:48178
|
2922 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (dropshot): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:48178
|
2923 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:48178
|
2924 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (nexus-producer-server): Nexus IP provided explicitly, will use it
addr = 127.0.0.1:52787
|
2925 | 2024-10-09T22:52:17.580Z | DEBG | test_utilization (nexus-producer-server): starting producer registration task
|
2926 | 2024-10-09T22:52:17.580Z | INFO | test_utilization (nexus-producer-server): starting oximeter metric producer server
address = 127.0.0.1:48178
file = oximeter/producer/src/lib.rs:283
interval = 10s
producer_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
2927 | 2024-10-09T22:52:17.581Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2928 | 2024-10-09T22:52:17.581Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2929 | 2024-10-09T22:52:17.581Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2930 | 2024-10-09T22:52:17.581Z | DEBG | test_utilization (producer-registration-task): registering / renewing oximeter producer lease with Nexus
|
2931 | 2024-10-09T22:52:17.581Z | DEBG | test_utilization (producer-registration-task): using nexus address for registration
addr = 127.0.0.1:52787
|
2932 | 2024-10-09T22:52:17.633Z | DEBG | test_utilization (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:52787/metrics/producers
|
2933 | 2024-10-09T22:52:17.634Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:65098
|
2934 | 2024-10-09T22:52:17.634Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:65098
req_id = e64acda1-c59e-4afe-97c4-34653d77452d
uri = /metrics/producers
|
2935 | 2024-10-09T22:52:17.635Z | TRAC | test_utilization (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:65098
req_id = e64acda1-c59e-4afe-97c4-34653d77452d
resource = Database
uri = /metrics/producers
|
2936 | 2024-10-09T22:52:17.635Z | DEBG | test_utilization (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:65098
req_id = e64acda1-c59e-4afe-97c4-34653d77452d
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
2937 | 2024-10-09T22:52:17.636Z | DEBG | test_utilization (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:65098
req_id = e64acda1-c59e-4afe-97c4-34653d77452d
resource = Database
result = Ok(())
uri = /metrics/producers
|
2938 | 2024-10-09T22:52:17.637Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
|
2939 | 2024-10-09T22:52:17.637Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2940 | 2024-10-09T22:52:17.637Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2941 | 2024-10-09T22:52:17.637Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2942 | 2024-10-09T22:52:17.638Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2943 | 2024-10-09T22:52:17.640Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2944 | 2024-10-09T22:52:17.645Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
result = Ok(())
|
2945 | 2024-10-09T22:52:17.645Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
|
2946 | 2024-10-09T22:52:17.645Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2947 | 2024-10-09T22:52:17.645Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2948 | 2024-10-09T22:52:17.645Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2949 | 2024-10-09T22:52:17.645Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2950 | 2024-10-09T22:52:17.647Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2951 | 2024-10-09T22:52:17.658Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
result = Ok(())
|
2952 | 2024-10-09T22:52:17.658Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2953 | 2024-10-09T22:52:17.658Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
2954 | 2024-10-09T22:52:17.660Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2955 | 2024-10-09T22:52:17.701Z | INFO | test_utilization (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 66584
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:65098
req_id = e64acda1-c59e-4afe-97c4-34653d77452d
response_code = 503
uri = /metrics/producers
|
2956 | 2024-10-09T22:52:17.702Z | DEBG | test_utilization (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:52787/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "e64acda1-c59e-4afe-97c4-34653d77452d", "content-length": "133", "date": "Wed, 09 Oct 2024 22:52:17 GMT"} })
|
2957 | 2024-10-09T22:52:17.703Z | WARN | test_utilization (producer-registration-task): failed to register as a producer with Nexus, will retry
delay = 176.568915ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"e64acda1-c59e-4afe-97c4-34653d77452d\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:52:17 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"e64acda1-c59e-4afe-97c4-34653d77452d\\" }"
file = oximeter/producer/src/lib.rs:424
|
2958 | 2024-10-09T22:52:17.721Z | DEBG | test_utilization (init_with_steps): Running step start_oximeter
|
2959 | 2024-10-09T22:52:17.721Z | DEBG | test_utilization: Starting Oximeter
|
2960 | 2024-10-09T22:52:17.722Z | DEBG | test_utilization (oximeter): registered DTrace probes
|
2961 | 2024-10-09T22:52:17.722Z | INFO | test_utilization (oximeter): starting oximeter server
file = oximeter/collector/src/lib.rs:203
|
2962 | 2024-10-09T22:52:17.722Z | INFO | test_utilization (DnsResolver): new DNS resolver
addresses = [[::1:0:0:0:1]:53, [::2:0:0:0:1]:53, [::3:0:0:0:1]:53]
file = internal-dns/src/resolver.rs:72
|
2963 | 2024-10-09T22:52:17.722Z | DEBG | test_utilization (oximeter): creating ClickHouse client
|
2964 | 2024-10-09T22:52:17.768Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = SELECT MAX(value) FROM oximeter.version;
|
2965 | 2024-10-09T22:52:17.780Z | WARN | test_utilization (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:731
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2966 | 2024-10-09T22:52:17.780Z | DEBG | test_utilization (oximeter-agent): oximeter database does not exist, creating
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
2967 | 2024-10-09T22:52:17.780Z | INFO | test_utilization (clickhouse-client): reading db version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:669
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2968 | 2024-10-09T22:52:17.780Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = SELECT MAX(value) FROM oximeter.version;
|
2969 | 2024-10-09T22:52:17.782Z | WARN | test_utilization (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:731
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2970 | 2024-10-09T22:52:17.782Z | INFO | test_utilization (clickhouse-client): read oximeter database version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:673
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
version = 0
|
2971 | 2024-10-09T22:52:17.782Z | INFO | test_utilization (clickhouse-client): wiping and re-initializing oximeter schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:678
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2972 | 2024-10-09T22:52:17.782Z | DEBG | test_utilization (clickhouse-client): wiping ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2973 | 2024-10-09T22:52:17.782Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = DROP DATABASE IF EXISTS oximeter
|
2974 | 2024-10-09T22:52:17.783Z | DEBG | test_utilization (clickhouse-client): initializing ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
2975 | 2024-10-09T22:52:17.783Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = CREATE DATABASE IF NOT EXISTS oximeter
|
2976 | 2024-10-09T22:52:17.786Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
|
2977 | 2024-10-09T22:52:17.791Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2978 | 2024-10-09T22:52:17.796Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2979 | 2024-10-09T22:52:17.800Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2980 | 2024-10-09T22:52:17.804Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2981 | 2024-10-09T22:52:17.808Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2982 | 2024-10-09T22:52:17.812Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2983 | 2024-10-09T22:52:17.817Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2984 | 2024-10-09T22:52:17.822Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2985 | 2024-10-09T22:52:17.826Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2986 | 2024-10-09T22:52:17.831Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2987 | 2024-10-09T22:52:17.835Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2988 | 2024-10-09T22:52:17.840Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2989 | 2024-10-09T22:52:17.845Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2990 | 2024-10-09T22:52:17.850Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2991 | 2024-10-09T22:52:17.858Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2992 | 2024-10-09T22:52:17.866Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2993 | 2024-10-09T22:52:17.871Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2994 | 2024-10-09T22:52:17.877Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2995 | 2024-10-09T22:52:17.931Z | DEBG | test_utilization (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:52787/metrics/producers
|
2996 | 2024-10-09T22:52:17.931Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:50739
|
2997 | 2024-10-09T22:52:17.932Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2998 | 2024-10-09T22:52:17.932Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:50739
req_id = 0d466af6-55a9-4387-a8a4-bd0be51d3cbc
uri = /metrics/producers
|
2999 | 2024-10-09T22:52:17.932Z | TRAC | test_utilization (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:50739
req_id = 0d466af6-55a9-4387-a8a4-bd0be51d3cbc
resource = Database
uri = /metrics/producers
|
3000 | 2024-10-09T22:52:17.932Z | DEBG | test_utilization (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:50739
req_id = 0d466af6-55a9-4387-a8a4-bd0be51d3cbc
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
3001 | 2024-10-09T22:52:17.933Z | DEBG | test_utilization (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:50739
req_id = 0d466af6-55a9-4387-a8a4-bd0be51d3cbc
resource = Database
result = Ok(())
uri = /metrics/producers
|
3002 | 2024-10-09T22:52:17.939Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3003 | 2024-10-09T22:52:17.946Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3004 | 2024-10-09T22:52:17.953Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3005 | 2024-10-09T22:52:17.959Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3006 | 2024-10-09T22:52:17.965Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3007 | 2024-10-09T22:52:17.975Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3008 | 2024-10-09T22:52:17.984Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3009 | 2024-10-09T22:52:17.992Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
3010 | 2024-10-09T22:52:17.995Z | INFO | test_utilization (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 63502
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:50739
req_id = 0d466af6-55a9-4387-a8a4-bd0be51d3cbc
response_code = 503
uri = /metrics/producers
|
3011 | 2024-10-09T22:52:17.996Z | DEBG | test_utilization (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:52787/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "0d466af6-55a9-4387-a8a4-bd0be51d3cbc", "content-length": "133", "date": "Wed, 09 Oct 2024 22:52:17 GMT"} })
|
3012 | 2024-10-09T22:52:17.998Z | WARN | test_utilization (producer-registration-task): failed to register as a producer with Nexus, will retry
delay = 563.954652ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"0d466af6-55a9-4387-a8a4-bd0be51d3cbc\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:52:17 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"0d466af6-55a9-4387-a8a4-bd0be51d3cbc\\" }"
file = oximeter/producer/src/lib.rs:424
|
3013 | 2024-10-09T22:52:17.999Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3014 | 2024-10-09T22:52:18.007Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3015 | 2024-10-09T22:52:18.024Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3016 | 2024-10-09T22:52:18.049Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3017 | 2024-10-09T22:52:18.061Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3018 | 2024-10-09T22:52:18.070Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3019 | 2024-10-09T22:52:18.077Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3020 | 2024-10-09T22:52:18.082Z | INFO | test_utilization (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = 136e1f04-b6a6-4c5d-8996-97c6cf8decce
|
3021 | 2024-10-09T22:52:18.083Z | DEBG | test_utilization (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = 136e1f04-b6a6-4c5d-8996-97c6cf8decce
time_started = 2024-10-09 22:52:16.855528 UTC
|
3022 | 2024-10-09T22:52:18.083Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 1.539126718s
iteration = 4
status = {"collection_id":"136e1f04-b6a6-4c5d-8996-97c6cf8decce","time_done":"2024-10-09 22:52:17.412602 UTC","time_started":"2024-10-09 22:52:16.855528 UTC"}
|
3023 | 2024-10-09T22:52:18.083Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 2
reason = Dependency
|
3024 | 2024-10-09T22:52:18.083Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 34.298\u{b5}s
iteration = 2
status = {"error":"task disabled"}
|
3025 | 2024-10-09T22:52:18.085Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3026 | 2024-10-09T22:52:18.091Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3027 | 2024-10-09T22:52:18.100Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3028 | 2024-10-09T22:52:18.105Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3029 | 2024-10-09T22:52:18.111Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
3030 | 2024-10-09T22:52:18.116Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
|
3031 | 2024-10-09T22:52:18.121Z | INFO | test_utilization (clickhouse-client): inserting current version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:701
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
version = 12
|
3032 | 2024-10-09T22:52:18.121Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.version (*) VALUES (12, now());
|
3033 | 2024-10-09T22:52:18.129Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:39379
method = GET
path = /info
|
3034 | 2024-10-09T22:52:18.129Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:39379
method = GET
path = /producers
|
3035 | 2024-10-09T22:52:18.130Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:39379
method = POST
path = /producers
|
3036 | 2024-10-09T22:52:18.130Z | DEBG | test_utilization (dropshot): registered endpoint
local_addr = [::1]:39379
method = DELETE
path = /producers/{producer_id}
|
3037 | 2024-10-09T22:52:18.130Z | INFO | test_utilization (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197
local_addr = [::1]:39379
|
3038 | 2024-10-09T22:52:18.130Z | DEBG | test_utilization (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:39379
|
3039 | 2024-10-09T22:52:18.130Z | DEBG | test_utilization (oximeter): contacting nexus
|
3040 | 2024-10-09T22:52:18.198Z | DEBG | test_utilization (oximeter): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:52787/metrics/collectors
|
3041 | 2024-10-09T22:52:18.200Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:38419
|
3042 | 2024-10-09T22:52:18.210Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:38419
req_id = f88cfe68-4b32-48a7-8d66-ff6dc93b9c83
uri = /metrics/collectors
|
3043 | 2024-10-09T22:52:18.212Z | TRAC | test_utilization (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:38419
req_id = f88cfe68-4b32-48a7-8d66-ff6dc93b9c83
resource = Database
uri = /metrics/collectors
|
3044 | 2024-10-09T22:52:18.212Z | DEBG | test_utilization (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:38419
req_id = f88cfe68-4b32-48a7-8d66-ff6dc93b9c83
roles = RoleSet { roles: {} }
uri = /metrics/collectors
|
3045 | 2024-10-09T22:52:18.214Z | DEBG | test_utilization (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:38419
req_id = f88cfe68-4b32-48a7-8d66-ff6dc93b9c83
resource = Database
result = Ok(())
uri = /metrics/collectors
|
3046 | 2024-10-09T22:52:18.223Z | INFO | test_utilization (nexus): registered new oximeter metric collection server
address = [::1]:39379
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
3047 | 2024-10-09T22:52:18.224Z | INFO | test_utilization (dropshot_internal): request completed
latency_us = 13895
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:38419
req_id = f88cfe68-4b32-48a7-8d66-ff6dc93b9c83
response_code = 204
uri = /metrics/collectors
|
3048 | 2024-10-09T22:52:18.224Z | DEBG | test_utilization (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:52787/metrics/collectors", status: 204, headers: {"x-request-id": "f88cfe68-4b32-48a7-8d66-ff6dc93b9c83", "date": "Wed, 09 Oct 2024 22:52:17 GMT"} })
|
3049 | 2024-10-09T22:52:18.226Z | INFO | test_utilization (oximeter): oximeter registered with nexus
file = oximeter/collector/src/lib.rs:312
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
3050 | 2024-10-09T22:52:18.226Z | DEBG | test_utilization (init_with_steps): Running step start_producer_server
|
3051 | 2024-10-09T22:52:18.226Z | DEBG | test_utilization: Starting test metric Producer Server
|
3052 | 2024-10-09T22:52:18.229Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/system/ip-pools
|
3053 | 2024-10-09T22:52:18.313Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:36966
|
3054 | 2024-10-09T22:52:18.313Z | INFO | test_utilization (dropshot_external): accepted connection
local_addr = 127.0.0.1:39037
remote_addr = 127.0.0.1:53166
|
3055 | 2024-10-09T22:52:18.313Z | INFO | test_utilization (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:770
|
3056 | 2024-10-09T22:52:18.313Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
3057 | 2024-10-09T22:52:18.314Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36966
req_id = 322f60fc-d842-4874-9316-8a4affbf745f
uri = /metrics/producers
|
3058 | 2024-10-09T22:52:18.316Z | TRAC | test_utilization (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36966
req_id = 322f60fc-d842-4874-9316-8a4affbf745f
resource = Database
uri = /metrics/producers
|
3059 | 2024-10-09T22:52:18.316Z | DEBG | test_utilization (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36966
req_id = 322f60fc-d842-4874-9316-8a4affbf745f
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
3060 | 2024-10-09T22:52:18.317Z | DEBG | test_utilization (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36966
req_id = 322f60fc-d842-4874-9316-8a4affbf745f
resource = Database
result = Ok(())
uri = /metrics/producers
|
3061 | 2024-10-09T22:52:18.318Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
uri = /v1/system/ip-pools
|
3062 | 2024-10-09T22:52:18.319Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
uri = /v1/system/ip-pools
|
3063 | 2024-10-09T22:52:18.319Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools
|
3064 | 2024-10-09T22:52:18.319Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3065 | 2024-10-09T22:52:18.319Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3066 | 2024-10-09T22:52:18.319Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3067 | 2024-10-09T22:52:18.321Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 314.076625ms
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
3068 | 2024-10-09T22:52:18.408Z | INFO | test_utilization (nexus): registered oximeter collector client
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
3069 | 2024-10-09T22:52:18.419Z | DEBG | test_utilization (nexus): client request
body = Some(Body)
method = POST
oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
uri = http://[::1]:39379/producers
|
3070 | 2024-10-09T22:52:18.419Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3071 | 2024-10-09T22:52:18.420Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3072 | 2024-10-09T22:52:18.421Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3073 | 2024-10-09T22:52:18.422Z | INFO | test_utilization (dropshot): accepted connection
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105
local_addr = [::1]:39379
remote_addr = [::1]:40574
|
3074 | 2024-10-09T22:52:18.423Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:39379
method = POST
remote_addr = [::1]:40574
req_id = 750f5e3d-6964-44c9-85d0-092cdf3292b7
uri = /producers
|
3075 | 2024-10-09T22:52:18.424Z | DEBG | test_utilization (oximeter-agent): registered new metric producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3076 | 2024-10-09T22:52:18.425Z | INFO | test_utilization (dropshot): request completed
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950
latency_us = 1421
local_addr = [::1]:39379
method = POST
remote_addr = [::1]:40574
req_id = 750f5e3d-6964-44c9-85d0-092cdf3292b7
response_code = 204
uri = /producers
|
3077 | 2024-10-09T22:52:18.525Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3078 | 2024-10-09T22:52:18.525Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3079 | 2024-10-09T22:52:18.525Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3080 | 2024-10-09T22:52:18.525Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3081 | 2024-10-09T22:52:18.526Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3082 | 2024-10-09T22:52:18.527Z | DEBG | test_utilization (collection-task): starting oximeter collection task
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
interval = 1s
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3083 | 2024-10-09T22:52:18.527Z | DEBG | test_utilization (nexus): client response
oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
result = Ok(Response { url: "http://[::1]:39379/producers", status: 204, headers: {"x-request-id": "750f5e3d-6964-44c9-85d0-092cdf3292b7", "date": "Wed, 09 Oct 2024 22:52:17 GMT"} })
|
3084 | 2024-10-09T22:52:18.528Z | INFO | test_utilization (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3085 | 2024-10-09T22:52:18.529Z | INFO | test_utilization (dropshot_internal): request completed
latency_us = 214996
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36966
req_id = 322f60fc-d842-4874-9316-8a4affbf745f
response_code = 201
uri = /metrics/producers
|
3086 | 2024-10-09T22:52:18.532Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3087 | 2024-10-09T22:52:18.533Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3088 | 2024-10-09T22:52:18.533Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3089 | 2024-10-09T22:52:18.533Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3090 | 2024-10-09T22:52:18.536Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3091 | 2024-10-09T22:52:18.546Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3092 | 2024-10-09T22:52:18.546Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3093 | 2024-10-09T22:52:18.546Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3094 | 2024-10-09T22:52:18.548Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3095 | 2024-10-09T22:52:18.550Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3096 | 2024-10-09T22:52:18.550Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3097 | 2024-10-09T22:52:18.550Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3098 | 2024-10-09T22:52:18.550Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3099 | 2024-10-09T22:52:18.550Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3100 | 2024-10-09T22:52:18.552Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3101 | 2024-10-09T22:52:18.552Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3102 | 2024-10-09T22:52:18.552Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3103 | 2024-10-09T22:52:18.553Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3104 | 2024-10-09T22:52:18.554Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3105 | 2024-10-09T22:52:18.558Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3106 | 2024-10-09T22:52:18.558Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
uri = /v1/system/ip-pools
|
3107 | 2024-10-09T22:52:18.558Z | TRAC | test_utilization (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = IpPoolList
uri = /v1/system/ip-pools
|
3108 | 2024-10-09T22:52:18.558Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools
|
3109 | 2024-10-09T22:52:18.558Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = Database
uri = /v1/system/ip-pools
|
3110 | 2024-10-09T22:52:18.558Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools
|
3111 | 2024-10-09T22:52:18.559Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = Database
result = Ok(())
uri = /v1/system/ip-pools
|
3112 | 2024-10-09T22:52:18.660Z | DEBG | test_utilization (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:52787/metrics/producers
|
3113 | 2024-10-09T22:52:18.660Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools
|
3114 | 2024-10-09T22:52:18.669Z | DEBG | test_utilization (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = IpPoolList
result = Ok(())
uri = /v1/system/ip-pools
|
3115 | 2024-10-09T22:52:18.669Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = Database
uri = /v1/system/ip-pools
|
3116 | 2024-10-09T22:52:18.669Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools
|
3117 | 2024-10-09T22:52:18.670Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
resource = Database
result = Ok(())
uri = /v1/system/ip-pools
|
3118 | 2024-10-09T22:52:18.670Z | INFO | test_utilization (dropshot_internal): accepted connection
local_addr = 127.0.0.1:52787
remote_addr = 127.0.0.1:36478
|
3119 | 2024-10-09T22:52:18.670Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
3120 | 2024-10-09T22:52:18.672Z | TRAC | test_utilization (dropshot_internal): incoming request
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36478
req_id = 906f4c52-9bab-4e44-9a49-d91bcc37244b
uri = /metrics/producers
|
3121 | 2024-10-09T22:52:18.673Z | TRAC | test_utilization (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36478
req_id = 906f4c52-9bab-4e44-9a49-d91bcc37244b
resource = Database
uri = /metrics/producers
|
3122 | 2024-10-09T22:52:18.673Z | DEBG | test_utilization (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36478
req_id = 906f4c52-9bab-4e44-9a49-d91bcc37244b
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
3123 | 2024-10-09T22:52:18.674Z | DEBG | test_utilization (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36478
req_id = 906f4c52-9bab-4e44-9a49-d91bcc37244b
resource = Database
result = Ok(())
uri = /metrics/producers
|
3124 | 2024-10-09T22:52:18.675Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 356866
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9d7183f7-b446-4bb3-8b37-4b70fcf834f8
response_code = 201
uri = /v1/system/ip-pools
|
3125 | 2024-10-09T22:52:18.676Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 660.995533ms
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
3126 | 2024-10-09T22:52:18.676Z | INFO | test_utilization (external client test context): client received response
status = 201
|
3127 | 2024-10-09T22:52:18.677Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/system/ip-pools/default/ranges/add
|
3128 | 2024-10-09T22:52:18.677Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
uri = /v1/system/ip-pools/default/ranges/add
|
3129 | 2024-10-09T22:52:18.678Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
uri = /v1/system/ip-pools/default/ranges/add
|
3130 | 2024-10-09T22:52:18.678Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools/default/ranges/add
|
3131 | 2024-10-09T22:52:18.678Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3132 | 2024-10-09T22:52:18.678Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3133 | 2024-10-09T22:52:18.679Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3134 | 2024-10-09T22:52:18.682Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3135 | 2024-10-09T22:52:18.682Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3136 | 2024-10-09T22:52:18.683Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3137 | 2024-10-09T22:52:18.685Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3138 | 2024-10-09T22:52:18.685Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3139 | 2024-10-09T22:52:18.685Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3140 | 2024-10-09T22:52:18.685Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3141 | 2024-10-09T22:52:18.686Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3142 | 2024-10-09T22:52:18.689Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3143 | 2024-10-09T22:52:18.689Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3144 | 2024-10-09T22:52:18.689Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3145 | 2024-10-09T22:52:18.693Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3146 | 2024-10-09T22:52:18.694Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3147 | 2024-10-09T22:52:18.700Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3148 | 2024-10-09T22:52:18.700Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3149 | 2024-10-09T22:52:18.700Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3150 | 2024-10-09T22:52:18.701Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3151 | 2024-10-09T22:52:18.705Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3152 | 2024-10-09T22:52:18.705Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3153 | 2024-10-09T22:52:18.705Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3154 | 2024-10-09T22:52:18.705Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3155 | 2024-10-09T22:52:18.707Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3156 | 2024-10-09T22:52:18.711Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3157 | 2024-10-09T22:52:18.711Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3158 | 2024-10-09T22:52:18.711Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3159 | 2024-10-09T22:52:18.711Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3160 | 2024-10-09T22:52:18.716Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3161 | 2024-10-09T22:52:18.720Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3162 | 2024-10-09T22:52:18.720Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
uri = /v1/system/ip-pools/default/ranges/add
|
3163 | 2024-10-09T22:52:18.721Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3164 | 2024-10-09T22:52:18.721Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3165 | 2024-10-09T22:52:18.721Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3166 | 2024-10-09T22:52:18.723Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/ranges/add
|
3167 | 2024-10-09T22:52:18.723Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/ranges/add
|
3168 | 2024-10-09T22:52:18.723Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3169 | 2024-10-09T22:52:18.723Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3170 | 2024-10-09T22:52:18.724Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3171 | 2024-10-09T22:52:18.728Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/ranges/add
|
3172 | 2024-10-09T22:52:18.742Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3173 | 2024-10-09T22:52:18.743Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3174 | 2024-10-09T22:52:18.743Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3175 | 2024-10-09T22:52:18.743Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3176 | 2024-10-09T22:52:18.829Z | INFO | test_utilization (nexus): registered oximeter collector client
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
3177 | 2024-10-09T22:52:18.829Z | DEBG | test_utilization (nexus): client request
body = Some(Body)
method = POST
oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
uri = http://[::1]:39379/producers
|
3178 | 2024-10-09T22:52:18.830Z | INFO | test_utilization (dropshot): accepted connection
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105
local_addr = [::1]:39379
remote_addr = [::1]:46382
|
3179 | 2024-10-09T22:52:18.831Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:39379
method = POST
remote_addr = [::1]:46382
req_id = 8f9c40f1-784a-4e5f-8b2e-73aa05c9b93e
uri = /producers
|
3180 | 2024-10-09T22:52:18.831Z | DEBG | test_utilization (oximeter-agent): registered new metric producer
address = 127.0.0.1:48178
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3181 | 2024-10-09T22:52:18.831Z | INFO | test_utilization (dropshot): request completed
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950
latency_us = 339
local_addr = [::1]:39379
method = POST
remote_addr = [::1]:46382
req_id = 8f9c40f1-784a-4e5f-8b2e-73aa05c9b93e
response_code = 204
uri = /producers
|
3182 | 2024-10-09T22:52:18.908Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3183 | 2024-10-09T22:52:18.908Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3184 | 2024-10-09T22:52:18.909Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3185 | 2024-10-09T22:52:18.910Z | DEBG | test_utilization (collection-task): starting oximeter collection task
address = 127.0.0.1:48178
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
interval = 10s
producer_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3186 | 2024-10-09T22:52:18.910Z | DEBG | test_utilization (nexus): client response
oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
result = Ok(Response { url: "http://[::1]:39379/producers", status: 204, headers: {"x-request-id": "8f9c40f1-784a-4e5f-8b2e-73aa05c9b93e", "date": "Wed, 09 Oct 2024 22:52:18 GMT"} })
|
3187 | 2024-10-09T22:52:18.910Z | INFO | test_utilization (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3188 | 2024-10-09T22:52:18.912Z | INFO | test_utilization (dropshot_internal): request completed
latency_us = 240470
local_addr = 127.0.0.1:52787
method = POST
remote_addr = 127.0.0.1:36478
req_id = 906f4c52-9bab-4e44-9a49-d91bcc37244b
response_code = 201
uri = /metrics/producers
|
3189 | 2024-10-09T22:52:18.912Z | TRAC | test_utilization (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/ranges/add
|
3190 | 2024-10-09T22:52:18.912Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/ranges/add
|
3191 | 2024-10-09T22:52:18.912Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3192 | 2024-10-09T22:52:18.912Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3193 | 2024-10-09T22:52:18.913Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3194 | 2024-10-09T22:52:18.914Z | DEBG | test_utilization (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:52787/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "906f4c52-9bab-4e44-9a49-d91bcc37244b", "content-length": "41", "date": "Wed, 09 Oct 2024 22:52:18 GMT"} })
|
3195 | 2024-10-09T22:52:18.917Z | DEBG | test_utilization (producer-registration-task): registered with nexus successfully
|
3196 | 2024-10-09T22:52:18.917Z | DEBG | test_utilization (producer-registration-task): pausing until time to renew lease
lease_duration = 600s
wait_period = 150s
|
3197 | 2024-10-09T22:52:18.919Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/ranges/add
|
3198 | 2024-10-09T22:52:18.921Z | DEBG | test_utilization (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3199 | 2024-10-09T22:52:18.931Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 253432
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = b7206442-b1be-4eb8-84f6-8816edfc4484
response_code = 201
uri = /v1/system/ip-pools/default/ranges/add
|
3200 | 2024-10-09T22:52:18.931Z | INFO | test_utilization (external client test context): client received response
status = 201
|
3201 | 2024-10-09T22:52:18.932Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/system/ip-pools/default/silos
|
3202 | 2024-10-09T22:52:18.932Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
uri = /v1/system/ip-pools/default/silos
|
3203 | 2024-10-09T22:52:18.933Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
uri = /v1/system/ip-pools/default/silos
|
3204 | 2024-10-09T22:52:18.933Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools/default/silos
|
3205 | 2024-10-09T22:52:18.933Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3206 | 2024-10-09T22:52:18.933Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3207 | 2024-10-09T22:52:18.934Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3208 | 2024-10-09T22:52:18.936Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3209 | 2024-10-09T22:52:18.936Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3210 | 2024-10-09T22:52:18.936Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3211 | 2024-10-09T22:52:18.938Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3212 | 2024-10-09T22:52:18.938Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3213 | 2024-10-09T22:52:18.938Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3214 | 2024-10-09T22:52:18.938Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3215 | 2024-10-09T22:52:18.939Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3216 | 2024-10-09T22:52:18.941Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3217 | 2024-10-09T22:52:18.941Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3218 | 2024-10-09T22:52:18.941Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3219 | 2024-10-09T22:52:18.942Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3220 | 2024-10-09T22:52:18.943Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3221 | 2024-10-09T22:52:18.947Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3222 | 2024-10-09T22:52:18.947Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3223 | 2024-10-09T22:52:18.947Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3224 | 2024-10-09T22:52:18.948Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3225 | 2024-10-09T22:52:18.950Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3226 | 2024-10-09T22:52:18.950Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3227 | 2024-10-09T22:52:18.950Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3228 | 2024-10-09T22:52:18.950Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3229 | 2024-10-09T22:52:18.951Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3230 | 2024-10-09T22:52:18.953Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3231 | 2024-10-09T22:52:18.953Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3232 | 2024-10-09T22:52:18.953Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3233 | 2024-10-09T22:52:18.954Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3234 | 2024-10-09T22:52:18.955Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3235 | 2024-10-09T22:52:18.959Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3236 | 2024-10-09T22:52:18.959Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
uri = /v1/system/ip-pools/default/silos
|
3237 | 2024-10-09T22:52:18.960Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3238 | 2024-10-09T22:52:18.960Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3239 | 2024-10-09T22:52:18.960Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3240 | 2024-10-09T22:52:18.964Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/silos
|
3241 | 2024-10-09T22:52:18.964Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3242 | 2024-10-09T22:52:18.964Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3243 | 2024-10-09T22:52:18.964Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3244 | 2024-10-09T22:52:18.964Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3245 | 2024-10-09T22:52:18.967Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3246 | 2024-10-09T22:52:18.971Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = IpPool { parent: Fleet, key: ed3e7faf-c1fa-4e07-91c7-c256fc080f08, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3247 | 2024-10-09T22:52:18.972Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3248 | 2024-10-09T22:52:18.972Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3249 | 2024-10-09T22:52:18.972Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3250 | 2024-10-09T22:52:18.975Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3251 | 2024-10-09T22:52:18.975Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3252 | 2024-10-09T22:52:18.976Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3253 | 2024-10-09T22:52:18.978Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
uri = /v1/system/ip-pools/default/silos
|
3254 | 2024-10-09T22:52:18.978Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/system/ip-pools/default/silos
|
3255 | 2024-10-09T22:52:18.978Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3256 | 2024-10-09T22:52:18.978Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3257 | 2024-10-09T22:52:18.979Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3258 | 2024-10-09T22:52:18.983Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3259 | 2024-10-09T22:52:18.983Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3260 | 2024-10-09T22:52:18.983Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3261 | 2024-10-09T22:52:18.984Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3262 | 2024-10-09T22:52:18.987Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3263 | 2024-10-09T22:52:18.994Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3264 | 2024-10-09T22:52:18.994Z | TRAC | test_utilization (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = IpPoolList
uri = /v1/system/ip-pools/default/silos
|
3265 | 2024-10-09T22:52:18.994Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3266 | 2024-10-09T22:52:18.994Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3267 | 2024-10-09T22:52:18.994Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3268 | 2024-10-09T22:52:18.994Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3269 | 2024-10-09T22:52:18.997Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3270 | 2024-10-09T22:52:19.006Z | DEBG | test_utilization (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = IpPoolList
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3271 | 2024-10-09T22:52:19.006Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3272 | 2024-10-09T22:52:19.007Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3273 | 2024-10-09T22:52:19.008Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3274 | 2024-10-09T22:52:19.013Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 81385
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 658c1fbf-f7a2-4bbb-83c9-59846d3da0ce
response_code = 201
uri = /v1/system/ip-pools/default/silos
|
3275 | 2024-10-09T22:52:19.014Z | INFO | test_utilization (external client test context): client received response
status = 201
|
3276 | 2024-10-09T22:52:19.014Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = PUT
uri = http://127.0.0.1:39037/v1/system/silos/test-suite-silo/quotas
|
3277 | 2024-10-09T22:52:19.015Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
uri = /v1/system/silos/test-suite-silo/quotas
|
3278 | 2024-10-09T22:52:19.015Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
uri = /v1/system/silos/test-suite-silo/quotas
|
3279 | 2024-10-09T22:52:19.015Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/silos/test-suite-silo/quotas
|
3280 | 2024-10-09T22:52:19.015Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3281 | 2024-10-09T22:52:19.015Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3282 | 2024-10-09T22:52:19.016Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3283 | 2024-10-09T22:52:19.019Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3284 | 2024-10-09T22:52:19.019Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3285 | 2024-10-09T22:52:19.020Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3286 | 2024-10-09T22:52:19.032Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3287 | 2024-10-09T22:52:19.033Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3288 | 2024-10-09T22:52:19.033Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3289 | 2024-10-09T22:52:19.033Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3290 | 2024-10-09T22:52:19.034Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3291 | 2024-10-09T22:52:19.038Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3292 | 2024-10-09T22:52:19.038Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3293 | 2024-10-09T22:52:19.038Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3294 | 2024-10-09T22:52:19.039Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3295 | 2024-10-09T22:52:19.043Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3296 | 2024-10-09T22:52:19.050Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3297 | 2024-10-09T22:52:19.050Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3298 | 2024-10-09T22:52:19.050Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3299 | 2024-10-09T22:52:19.051Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3300 | 2024-10-09T22:52:19.060Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3301 | 2024-10-09T22:52:19.060Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3302 | 2024-10-09T22:52:19.060Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3303 | 2024-10-09T22:52:19.060Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3304 | 2024-10-09T22:52:19.061Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3305 | 2024-10-09T22:52:19.071Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3306 | 2024-10-09T22:52:19.071Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3307 | 2024-10-09T22:52:19.071Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3308 | 2024-10-09T22:52:19.072Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3309 | 2024-10-09T22:52:19.076Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3310 | 2024-10-09T22:52:19.081Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3311 | 2024-10-09T22:52:19.081Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
uri = /v1/system/silos/test-suite-silo/quotas
|
3312 | 2024-10-09T22:52:19.081Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3313 | 2024-10-09T22:52:19.081Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3314 | 2024-10-09T22:52:19.082Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3315 | 2024-10-09T22:52:19.093Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
uri = /v1/system/silos/test-suite-silo/quotas
|
3316 | 2024-10-09T22:52:19.093Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource_id = 9c1defc9-b8dc-4eb6-acde-8c84570c6637
resource_type = Silo
uri = /v1/system/silos/test-suite-silo/quotas
|
3317 | 2024-10-09T22:52:19.093Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3318 | 2024-10-09T22:52:19.093Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3319 | 2024-10-09T22:52:19.094Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3320 | 2024-10-09T22:52:19.098Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/silos/test-suite-silo/quotas
|
3321 | 2024-10-09T22:52:19.099Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3322 | 2024-10-09T22:52:19.099Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3323 | 2024-10-09T22:52:19.100Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3324 | 2024-10-09T22:52:19.102Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3325 | 2024-10-09T22:52:19.110Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3326 | 2024-10-09T22:52:19.110Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
uri = /v1/system/silos/test-suite-silo/quotas
|
3327 | 2024-10-09T22:52:19.110Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource_id = 9c1defc9-b8dc-4eb6-acde-8c84570c6637
resource_type = Silo
uri = /v1/system/silos/test-suite-silo/quotas
|
3328 | 2024-10-09T22:52:19.110Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3329 | 2024-10-09T22:52:19.110Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3330 | 2024-10-09T22:52:19.111Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3331 | 2024-10-09T22:52:19.113Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/silos/test-suite-silo/quotas
|
3332 | 2024-10-09T22:52:19.113Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3333 | 2024-10-09T22:52:19.114Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3334 | 2024-10-09T22:52:19.114Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3335 | 2024-10-09T22:52:19.118Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3336 | 2024-10-09T22:52:19.126Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3337 | 2024-10-09T22:52:19.126Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3338 | 2024-10-09T22:52:19.126Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3339 | 2024-10-09T22:52:19.127Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3340 | 2024-10-09T22:52:19.133Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 117834
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 95781d79-f82b-458e-9eb1-6831a4e9e359
response_code = 200
uri = /v1/system/silos/test-suite-silo/quotas
|
3341 | 2024-10-09T22:52:19.134Z | INFO | test_utilization (external client test context): client received response
status = 200
|
3342 | 2024-10-09T22:52:19.134Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:39037/v1/system/utilization/silos
|
3343 | 2024-10-09T22:52:19.144Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
uri = /v1/system/utilization/silos
|
3344 | 2024-10-09T22:52:19.145Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
uri = /v1/system/utilization/silos
|
3345 | 2024-10-09T22:52:19.145Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/utilization/silos
|
3346 | 2024-10-09T22:52:19.145Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3347 | 2024-10-09T22:52:19.145Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3348 | 2024-10-09T22:52:19.145Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3349 | 2024-10-09T22:52:19.154Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3350 | 2024-10-09T22:52:19.154Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3351 | 2024-10-09T22:52:19.155Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3352 | 2024-10-09T22:52:19.158Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3353 | 2024-10-09T22:52:19.158Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3354 | 2024-10-09T22:52:19.159Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3355 | 2024-10-09T22:52:19.159Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3356 | 2024-10-09T22:52:19.159Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3357 | 2024-10-09T22:52:19.162Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3358 | 2024-10-09T22:52:19.162Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3359 | 2024-10-09T22:52:19.162Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3360 | 2024-10-09T22:52:19.164Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3361 | 2024-10-09T22:52:19.172Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3362 | 2024-10-09T22:52:19.176Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3363 | 2024-10-09T22:52:19.176Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3364 | 2024-10-09T22:52:19.176Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3365 | 2024-10-09T22:52:19.177Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3366 | 2024-10-09T22:52:19.186Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3367 | 2024-10-09T22:52:19.186Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3368 | 2024-10-09T22:52:19.186Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3369 | 2024-10-09T22:52:19.186Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3370 | 2024-10-09T22:52:19.187Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3371 | 2024-10-09T22:52:19.189Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3372 | 2024-10-09T22:52:19.189Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3373 | 2024-10-09T22:52:19.189Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3374 | 2024-10-09T22:52:19.190Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3375 | 2024-10-09T22:52:19.192Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3376 | 2024-10-09T22:52:19.196Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3377 | 2024-10-09T22:52:19.196Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
uri = /v1/system/utilization/silos
|
3378 | 2024-10-09T22:52:19.196Z | TRAC | test_utilization (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Fleet
uri = /v1/system/utilization/silos
|
3379 | 2024-10-09T22:52:19.196Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/utilization/silos
|
3380 | 2024-10-09T22:52:19.196Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Database
uri = /v1/system/utilization/silos
|
3381 | 2024-10-09T22:52:19.196Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos
|
3382 | 2024-10-09T22:52:19.197Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos
|
3383 | 2024-10-09T22:52:19.201Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/utilization/silos
|
3384 | 2024-10-09T22:52:19.207Z | DEBG | test_utilization (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Fleet
result = Ok(())
uri = /v1/system/utilization/silos
|
3385 | 2024-10-09T22:52:19.207Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Database
uri = /v1/system/utilization/silos
|
3386 | 2024-10-09T22:52:19.207Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos
|
3387 | 2024-10-09T22:52:19.207Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos
|
3388 | 2024-10-09T22:52:19.208Z | TRAC | test_utilization (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3389 | 2024-10-09T22:52:19.217Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 73797
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = edb99cb3-bf4f-4743-b47e-8f7d8500dfd2
response_code = 200
uri = /v1/system/utilization/silos
|
3390 | 2024-10-09T22:52:19.218Z | INFO | test_utilization (external client test context): client received response
status = 200
|
3391 | 2024-10-09T22:52:19.219Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = PUT
uri = http://127.0.0.1:39037/v1/system/silos/test-suite-silo/quotas
|
3392 | 2024-10-09T22:52:19.219Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
uri = /v1/system/silos/test-suite-silo/quotas
|
3393 | 2024-10-09T22:52:19.220Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
uri = /v1/system/silos/test-suite-silo/quotas
|
3394 | 2024-10-09T22:52:19.220Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/silos/test-suite-silo/quotas
|
3395 | 2024-10-09T22:52:19.220Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3396 | 2024-10-09T22:52:19.220Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3397 | 2024-10-09T22:52:19.221Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3398 | 2024-10-09T22:52:19.223Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3399 | 2024-10-09T22:52:19.223Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3400 | 2024-10-09T22:52:19.224Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3401 | 2024-10-09T22:52:19.227Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3402 | 2024-10-09T22:52:19.227Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3403 | 2024-10-09T22:52:19.227Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3404 | 2024-10-09T22:52:19.227Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3405 | 2024-10-09T22:52:19.228Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3406 | 2024-10-09T22:52:19.230Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3407 | 2024-10-09T22:52:19.230Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3408 | 2024-10-09T22:52:19.230Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3409 | 2024-10-09T22:52:19.233Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3410 | 2024-10-09T22:52:19.234Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3411 | 2024-10-09T22:52:19.240Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3412 | 2024-10-09T22:52:19.240Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3413 | 2024-10-09T22:52:19.241Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3414 | 2024-10-09T22:52:19.241Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3415 | 2024-10-09T22:52:19.243Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3416 | 2024-10-09T22:52:19.243Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3417 | 2024-10-09T22:52:19.243Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3418 | 2024-10-09T22:52:19.243Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3419 | 2024-10-09T22:52:19.244Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3420 | 2024-10-09T22:52:19.257Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3421 | 2024-10-09T22:52:19.257Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3422 | 2024-10-09T22:52:19.257Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3423 | 2024-10-09T22:52:19.258Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3424 | 2024-10-09T22:52:19.263Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3425 | 2024-10-09T22:52:19.267Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3426 | 2024-10-09T22:52:19.267Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
uri = /v1/system/silos/test-suite-silo/quotas
|
3427 | 2024-10-09T22:52:19.267Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3428 | 2024-10-09T22:52:19.268Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3429 | 2024-10-09T22:52:19.268Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3430 | 2024-10-09T22:52:19.272Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
uri = /v1/system/silos/test-suite-silo/quotas
|
3431 | 2024-10-09T22:52:19.272Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource_id = 9c1defc9-b8dc-4eb6-acde-8c84570c6637
resource_type = Silo
uri = /v1/system/silos/test-suite-silo/quotas
|
3432 | 2024-10-09T22:52:19.272Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3433 | 2024-10-09T22:52:19.272Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3434 | 2024-10-09T22:52:19.273Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3435 | 2024-10-09T22:52:19.277Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/silos/test-suite-silo/quotas
|
3436 | 2024-10-09T22:52:19.277Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3437 | 2024-10-09T22:52:19.277Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3438 | 2024-10-09T22:52:19.278Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3439 | 2024-10-09T22:52:19.284Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3440 | 2024-10-09T22:52:19.291Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3441 | 2024-10-09T22:52:19.291Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
uri = /v1/system/silos/test-suite-silo/quotas
|
3442 | 2024-10-09T22:52:19.291Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource_id = 9c1defc9-b8dc-4eb6-acde-8c84570c6637
resource_type = Silo
uri = /v1/system/silos/test-suite-silo/quotas
|
3443 | 2024-10-09T22:52:19.291Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3444 | 2024-10-09T22:52:19.291Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3445 | 2024-10-09T22:52:19.292Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3446 | 2024-10-09T22:52:19.294Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/silos/test-suite-silo/quotas
|
3447 | 2024-10-09T22:52:19.295Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3448 | 2024-10-09T22:52:19.295Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3449 | 2024-10-09T22:52:19.295Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3450 | 2024-10-09T22:52:19.303Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3451 | 2024-10-09T22:52:19.311Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Silo { parent: Fleet, key: 9c1defc9-b8dc-4eb6-acde-8c84570c6637, lookup_type: ByName("test-suite-silo") }
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3452 | 2024-10-09T22:52:19.311Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
uri = /v1/system/silos/test-suite-silo/quotas
|
3453 | 2024-10-09T22:52:19.311Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
roles = RoleSet { roles: {} }
uri = /v1/system/silos/test-suite-silo/quotas
|
3454 | 2024-10-09T22:52:19.312Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
resource = Database
result = Ok(())
uri = /v1/system/silos/test-suite-silo/quotas
|
3455 | 2024-10-09T22:52:19.316Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 96855
local_addr = 127.0.0.1:39037
method = PUT
remote_addr = 127.0.0.1:53166
req_id = 170f01d1-86e9-425c-bb3c-d3371ee5b7f7
response_code = 200
uri = /v1/system/silos/test-suite-silo/quotas
|
3456 | 2024-10-09T22:52:19.317Z | INFO | test_utilization (external client test context): client received response
status = 200
|
3457 | 2024-10-09T22:52:19.317Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:39037/v1/system/utilization/silos
|
3458 | 2024-10-09T22:52:19.317Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
uri = /v1/system/utilization/silos
|
3459 | 2024-10-09T22:52:19.317Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
uri = /v1/system/utilization/silos
|
3460 | 2024-10-09T22:52:19.317Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/utilization/silos
|
3461 | 2024-10-09T22:52:19.317Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3462 | 2024-10-09T22:52:19.318Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3463 | 2024-10-09T22:52:19.318Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3464 | 2024-10-09T22:52:19.320Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3465 | 2024-10-09T22:52:19.320Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3466 | 2024-10-09T22:52:19.320Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3467 | 2024-10-09T22:52:19.322Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3468 | 2024-10-09T22:52:19.322Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3469 | 2024-10-09T22:52:19.322Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3470 | 2024-10-09T22:52:19.323Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3471 | 2024-10-09T22:52:19.324Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3472 | 2024-10-09T22:52:19.328Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3473 | 2024-10-09T22:52:19.328Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3474 | 2024-10-09T22:52:19.328Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3475 | 2024-10-09T22:52:19.329Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3476 | 2024-10-09T22:52:19.332Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3477 | 2024-10-09T22:52:19.335Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3478 | 2024-10-09T22:52:19.335Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3479 | 2024-10-09T22:52:19.335Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3480 | 2024-10-09T22:52:19.336Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3481 | 2024-10-09T22:52:19.338Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
3482 | 2024-10-09T22:52:19.338Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3483 | 2024-10-09T22:52:19.338Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3484 | 2024-10-09T22:52:19.338Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3485 | 2024-10-09T22:52:19.338Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3486 | 2024-10-09T22:52:19.339Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3487 | 2024-10-09T22:52:19.341Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 1.43141692s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
3488 | 2024-10-09T22:52:19.341Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3489 | 2024-10-09T22:52:19.341Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3490 | 2024-10-09T22:52:19.341Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3491 | 2024-10-09T22:52:19.342Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3492 | 2024-10-09T22:52:19.344Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3493 | 2024-10-09T22:52:19.347Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3494 | 2024-10-09T22:52:19.347Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
uri = /v1/system/utilization/silos
|
3495 | 2024-10-09T22:52:19.347Z | TRAC | test_utilization (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Fleet
uri = /v1/system/utilization/silos
|
3496 | 2024-10-09T22:52:19.347Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/utilization/silos
|
3497 | 2024-10-09T22:52:19.347Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Database
uri = /v1/system/utilization/silos
|
3498 | 2024-10-09T22:52:19.347Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos
|
3499 | 2024-10-09T22:52:19.348Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos
|
3500 | 2024-10-09T22:52:19.350Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/utilization/silos
|
3501 | 2024-10-09T22:52:19.355Z | DEBG | test_utilization (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Fleet
result = Ok(())
uri = /v1/system/utilization/silos
|
3502 | 2024-10-09T22:52:19.356Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Database
uri = /v1/system/utilization/silos
|
3503 | 2024-10-09T22:52:19.356Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos
|
3504 | 2024-10-09T22:52:19.356Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos
|
3505 | 2024-10-09T22:52:19.360Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 42720
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 0e11d927-44a5-4b6b-89e4-e581d00e7e47
response_code = 200
uri = /v1/system/utilization/silos
|
3506 | 2024-10-09T22:52:19.360Z | INFO | test_utilization (external client test context): client received response
status = 200
|
3507 | 2024-10-09T22:52:19.361Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/projects
|
3508 | 2024-10-09T22:52:19.361Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
uri = /v1/projects
|
3509 | 2024-10-09T22:52:19.361Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
uri = /v1/projects
|
3510 | 2024-10-09T22:52:19.361Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/projects
|
3511 | 2024-10-09T22:52:19.361Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3512 | 2024-10-09T22:52:19.361Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3513 | 2024-10-09T22:52:19.362Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3514 | 2024-10-09T22:52:19.364Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3515 | 2024-10-09T22:52:19.364Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3516 | 2024-10-09T22:52:19.364Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3517 | 2024-10-09T22:52:19.367Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3518 | 2024-10-09T22:52:19.367Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3519 | 2024-10-09T22:52:19.367Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3520 | 2024-10-09T22:52:19.367Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3521 | 2024-10-09T22:52:19.368Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3522 | 2024-10-09T22:52:19.369Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3523 | 2024-10-09T22:52:19.370Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3524 | 2024-10-09T22:52:19.370Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3525 | 2024-10-09T22:52:19.371Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3526 | 2024-10-09T22:52:19.373Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3527 | 2024-10-09T22:52:19.377Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3528 | 2024-10-09T22:52:19.377Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3529 | 2024-10-09T22:52:19.377Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3530 | 2024-10-09T22:52:19.378Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3531 | 2024-10-09T22:52:19.380Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3532 | 2024-10-09T22:52:19.380Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3533 | 2024-10-09T22:52:19.380Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3534 | 2024-10-09T22:52:19.380Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3535 | 2024-10-09T22:52:19.381Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3536 | 2024-10-09T22:52:19.383Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3537 | 2024-10-09T22:52:19.383Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3538 | 2024-10-09T22:52:19.383Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3539 | 2024-10-09T22:52:19.383Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3540 | 2024-10-09T22:52:19.385Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3541 | 2024-10-09T22:52:19.389Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3542 | 2024-10-09T22:52:19.389Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
uri = /v1/projects
|
3543 | 2024-10-09T22:52:19.389Z | TRAC | test_utilization (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
uri = /v1/projects
|
3544 | 2024-10-09T22:52:19.390Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/projects
|
3545 | 2024-10-09T22:52:19.390Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Database
uri = /v1/projects
|
3546 | 2024-10-09T22:52:19.390Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
roles = RoleSet { roles: {} }
uri = /v1/projects
|
3547 | 2024-10-09T22:52:19.390Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Database
result = Ok(())
uri = /v1/projects
|
3548 | 2024-10-09T22:52:19.393Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/projects
|
3549 | 2024-10-09T22:52:19.393Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Database
uri = /v1/projects
|
3550 | 2024-10-09T22:52:19.393Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
roles = RoleSet { roles: {} }
uri = /v1/projects
|
3551 | 2024-10-09T22:52:19.393Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Database
result = Ok(())
uri = /v1/projects
|
3552 | 2024-10-09T22:52:19.396Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/projects
|
3553 | 2024-10-09T22:52:19.399Z | DEBG | test_utilization (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
uri = /v1/projects
|
3554 | 2024-10-09T22:52:19.400Z | INFO | test_utilization (SagaExecutor): preparing saga
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
|
3555 | 2024-10-09T22:52:19.400Z | INFO | test_utilization (SEC): saga create
dag = {"end_node":19,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[2,3,null],[16,17,null],[18,0,null],[17,19,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"utilization-test-project"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":18}
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3556 | 2024-10-09T22:52:19.400Z | INFO | test_utilization (SecStore): creating saga
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
|
3557 | 2024-10-09T22:52:19.452Z | INFO | test_utilization (SagaExecutor): starting saga
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
|
3558 | 2024-10-09T22:52:19.453Z | INFO | test_utilization (SEC): saga start
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3559 | 2024-10-09T22:52:19.453Z | DEBG | test_utilization (SEC): saga log event
new_state = N018 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3560 | 2024-10-09T22:52:19.453Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3561 | 2024-10-09T22:52:19.461Z | DEBG | test_utilization (SEC): saga log event
new_state = N018 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3562 | 2024-10-09T22:52:19.461Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3563 | 2024-10-09T22:52:19.465Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3564 | 2024-10-09T22:52:19.465Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3565 | 2024-10-09T22:52:19.469Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3566 | 2024-10-09T22:52:19.469Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3567 | 2024-10-09T22:52:19.469Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3568 | 2024-10-09T22:52:19.469Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3569 | 2024-10-09T22:52:19.470Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3570 | 2024-10-09T22:52:19.472Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3571 | 2024-10-09T22:52:19.472Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3572 | 2024-10-09T22:52:19.472Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3573 | 2024-10-09T22:52:19.473Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3574 | 2024-10-09T22:52:19.476Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3575 | 2024-10-09T22:52:19.486Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3576 | 2024-10-09T22:52:19.486Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3577 | 2024-10-09T22:52:19.486Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3578 | 2024-10-09T22:52:19.487Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = ProjectCreateRecord
|
3579 | 2024-10-09T22:52:19.500Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3580 | 2024-10-09T22:52:19.500Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "name": String("utilization-test-project"), "time_created": String("2024-10-09T22:52:19.469094Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.469094Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}])
node_id = 0
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3581 | 2024-10-09T22:52:19.504Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3582 | 2024-10-09T22:52:19.504Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3583 | 2024-10-09T22:52:19.508Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3584 | 2024-10-09T22:52:19.508Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"authz_project": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6a:4928:7900::/48"), "name": String("default")}})
node_id = 1
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3585 | 2024-10-09T22:52:19.512Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3586 | 2024-10-09T22:52:19.512Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3587 | 2024-10-09T22:52:19.515Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3588 | 2024-10-09T22:52:19.515Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3589 | 2024-10-09T22:52:19.519Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3590 | 2024-10-09T22:52:19.519Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3591 | 2024-10-09T22:52:19.522Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3592 | 2024-10-09T22:52:19.522Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("88f461fb-16a8-43c7-b5d3-b42110c60a94"))
node_id = 3
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3593 | 2024-10-09T22:52:19.526Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3594 | 2024-10-09T22:52:19.526Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3595 | 2024-10-09T22:52:19.526Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3596 | 2024-10-09T22:52:19.530Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3597 | 2024-10-09T22:52:19.531Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3598 | 2024-10-09T22:52:19.531Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("3840fbbb-7c81-4ba0-916c-7b54122ff416"))
node_id = 4
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3599 | 2024-10-09T22:52:19.534Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3600 | 2024-10-09T22:52:19.534Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3601 | 2024-10-09T22:52:19.537Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3602 | 2024-10-09T22:52:19.537Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("39bffe36-848b-4d5a-85b7-06db0dccf665"))
node_id = 5
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3603 | 2024-10-09T22:52:19.540Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3604 | 2024-10-09T22:52:19.540Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3605 | 2024-10-09T22:52:19.544Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3606 | 2024-10-09T22:52:19.544Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("b7517d09-24b8-4c2d-b522-cba37c3ad63f"))
node_id = 6
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3607 | 2024-10-09T22:52:19.547Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3608 | 2024-10-09T22:52:19.547Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3609 | 2024-10-09T22:52:19.554Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3610 | 2024-10-09T22:52:19.554Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"))
node_id = 7
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3611 | 2024-10-09T22:52:19.558Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3612 | 2024-10-09T22:52:19.558Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3613 | 2024-10-09T22:52:19.571Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3614 | 2024-10-09T22:52:19.571Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("55b8dcd1-c908-4045-86f2-1dfc927b3692"))
node_id = 8
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3615 | 2024-10-09T22:52:19.575Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3616 | 2024-10-09T22:52:19.575Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3617 | 2024-10-09T22:52:19.579Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3618 | 2024-10-09T22:52:19.579Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3619 | 2024-10-09T22:52:19.579Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3620 | 2024-10-09T22:52:19.579Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3621 | 2024-10-09T22:52:19.580Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3622 | 2024-10-09T22:52:19.582Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3623 | 2024-10-09T22:52:19.583Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3624 | 2024-10-09T22:52:19.583Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3625 | 2024-10-09T22:52:19.583Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3626 | 2024-10-09T22:52:19.585Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3627 | 2024-10-09T22:52:19.585Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3628 | 2024-10-09T22:52:19.585Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3629 | 2024-10-09T22:52:19.586Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3630 | 2024-10-09T22:52:19.588Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3631 | 2024-10-09T22:52:19.593Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3632 | 2024-10-09T22:52:19.593Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3633 | 2024-10-09T22:52:19.593Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3634 | 2024-10-09T22:52:19.594Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateVpc
|
3635 | 2024-10-09T22:52:19.603Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3636 | 2024-10-09T22:52:19.604Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "name": String("default"), "time_created": String("2024-10-09T22:52:19.579105Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.579105Z")}, "ipv6_prefix": String("fd6a:4928:7900::/48"), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "subnet_gen": Number(1), "system_router_id": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "vni": Number(8221063)}])
node_id = 9
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3637 | 2024-10-09T22:52:19.607Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3638 | 2024-10-09T22:52:19.607Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3639 | 2024-10-09T22:52:19.611Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3640 | 2024-10-09T22:52:19.611Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3641 | 2024-10-09T22:52:19.611Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3642 | 2024-10-09T22:52:19.611Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3643 | 2024-10-09T22:52:19.612Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3644 | 2024-10-09T22:52:19.614Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3645 | 2024-10-09T22:52:19.614Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3646 | 2024-10-09T22:52:19.614Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3647 | 2024-10-09T22:52:19.614Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3648 | 2024-10-09T22:52:19.616Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3649 | 2024-10-09T22:52:19.617Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3650 | 2024-10-09T22:52:19.617Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3651 | 2024-10-09T22:52:19.617Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3652 | 2024-10-09T22:52:19.620Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3653 | 2024-10-09T22:52:19.626Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3654 | 2024-10-09T22:52:19.626Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3655 | 2024-10-09T22:52:19.626Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3656 | 2024-10-09T22:52:19.626Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateRouter
|
3657 | 2024-10-09T22:52:19.677Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3658 | 2024-10-09T22:52:19.677Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "lookup_type": Object {"ById": String("3840fbbb-7c81-4ba0-916c-7b54122ff416")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 10
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3659 | 2024-10-09T22:52:19.680Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3660 | 2024-10-09T22:52:19.680Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3661 | 2024-10-09T22:52:19.684Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3662 | 2024-10-09T22:52:19.684Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3663 | 2024-10-09T22:52:19.684Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3664 | 2024-10-09T22:52:19.684Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3665 | 2024-10-09T22:52:19.685Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3666 | 2024-10-09T22:52:19.687Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3667 | 2024-10-09T22:52:19.687Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3668 | 2024-10-09T22:52:19.687Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3669 | 2024-10-09T22:52:19.688Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3670 | 2024-10-09T22:52:19.690Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3671 | 2024-10-09T22:52:19.690Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3672 | 2024-10-09T22:52:19.690Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3673 | 2024-10-09T22:52:19.690Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3674 | 2024-10-09T22:52:19.693Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3675 | 2024-10-09T22:52:19.699Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3676 | 2024-10-09T22:52:19.700Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3677 | 2024-10-09T22:52:19.700Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3678 | 2024-10-09T22:52:19.700Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV4Route
|
3679 | 2024-10-09T22:52:19.746Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3680 | 2024-10-09T22:52:19.746Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 11
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3681 | 2024-10-09T22:52:19.750Z | DEBG | test_utilization (SEC): saga log event
new_state = N012 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3682 | 2024-10-09T22:52:19.750Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3683 | 2024-10-09T22:52:19.753Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3684 | 2024-10-09T22:52:19.753Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3685 | 2024-10-09T22:52:19.753Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3686 | 2024-10-09T22:52:19.753Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3687 | 2024-10-09T22:52:19.754Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3688 | 2024-10-09T22:52:19.757Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3689 | 2024-10-09T22:52:19.757Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3690 | 2024-10-09T22:52:19.757Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3691 | 2024-10-09T22:52:19.758Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3692 | 2024-10-09T22:52:19.761Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3693 | 2024-10-09T22:52:19.761Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3694 | 2024-10-09T22:52:19.761Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3695 | 2024-10-09T22:52:19.762Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3696 | 2024-10-09T22:52:19.765Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3697 | 2024-10-09T22:52:19.774Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3698 | 2024-10-09T22:52:19.774Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3699 | 2024-10-09T22:52:19.774Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3700 | 2024-10-09T22:52:19.774Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateV6Route
|
3701 | 2024-10-09T22:52:19.782Z | DEBG | test_utilization (SEC): saga log event
new_state = N012 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3702 | 2024-10-09T22:52:19.782Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3703 | 2024-10-09T22:52:19.788Z | DEBG | test_utilization (SEC): saga log event
new_state = N013 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3704 | 2024-10-09T22:52:19.788Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3705 | 2024-10-09T22:52:19.792Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3706 | 2024-10-09T22:52:19.792Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3707 | 2024-10-09T22:52:19.792Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3708 | 2024-10-09T22:52:19.792Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3709 | 2024-10-09T22:52:19.793Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3710 | 2024-10-09T22:52:19.796Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3711 | 2024-10-09T22:52:19.796Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3712 | 2024-10-09T22:52:19.796Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3713 | 2024-10-09T22:52:19.796Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3714 | 2024-10-09T22:52:19.799Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3715 | 2024-10-09T22:52:19.799Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3716 | 2024-10-09T22:52:19.799Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3717 | 2024-10-09T22:52:19.800Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3718 | 2024-10-09T22:52:19.804Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3719 | 2024-10-09T22:52:19.811Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3720 | 2024-10-09T22:52:19.817Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3721 | 2024-10-09T22:52:19.817Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3722 | 2024-10-09T22:52:19.818Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3723 | 2024-10-09T22:52:19.837Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3724 | 2024-10-09T22:52:19.837Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3725 | 2024-10-09T22:52:19.840Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateSubnet
|
3726 | 2024-10-09T22:52:19.844Z | DEBG | test_utilization (SEC): saga log event
new_state = N013 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3727 | 2024-10-09T22:52:19.844Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "lookup_type": Object {"ById": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "name": String("default"), "time_created": String("2024-10-09T22:52:19.792397Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.792397Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:4928:7900::/64"), "rcgen": Number(1), "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}])
node_id = 13
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3728 | 2024-10-09T22:52:19.849Z | DEBG | test_utilization (SEC): saga log event
new_state = N014 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3729 | 2024-10-09T22:52:19.849Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3730 | 2024-10-09T22:52:19.853Z | DEBG | test_utilization (nexus): default firewall rules for vpc default
rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: f7fbb0d6-e408-4207-b1ad-c4f3b4d0e2ad, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2024-10-09T22:52:19.853610676Z, time_modified: 2024-10-09T22:52:19.853610676Z, time_deleted: None }, vpc_id: 88f461fb-16a8-43c7-b5d3-b42110c60a94, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 903ff0e8-949c-4a16-b455-a4ceb90eb0c8, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2024-10-09T22:52:19.853626995Z, time_modified: 2024-10-09T22:52:19.853626995Z, time_deleted: None }, vpc_id: 88f461fb-16a8-43c7-b5d3-b42110c60a94, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 25e7e445-493d-4c8d-b38f-75025b1936ed, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2024-10-09T22:52:19.853668713Z, time_modified: 2024-10-09T22:52:19.853668713Z, time_deleted: None }, vpc_id: 88f461fb-16a8-43c7-b5d3-b42110c60a94, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
|
3731 | 2024-10-09T22:52:19.853Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3732 | 2024-10-09T22:52:19.853Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3733 | 2024-10-09T22:52:19.853Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3734 | 2024-10-09T22:52:19.854Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3735 | 2024-10-09T22:52:19.854Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3736 | 2024-10-09T22:52:19.858Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3737 | 2024-10-09T22:52:19.858Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3738 | 2024-10-09T22:52:19.858Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3739 | 2024-10-09T22:52:19.859Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3740 | 2024-10-09T22:52:19.861Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3741 | 2024-10-09T22:52:19.861Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3742 | 2024-10-09T22:52:19.861Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3743 | 2024-10-09T22:52:19.862Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3744 | 2024-10-09T22:52:19.865Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3745 | 2024-10-09T22:52:19.870Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3746 | 2024-10-09T22:52:19.870Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3747 | 2024-10-09T22:52:19.870Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3748 | 2024-10-09T22:52:19.870Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3749 | 2024-10-09T22:52:19.884Z | DEBG | test_utilization (SEC): saga log event
new_state = N014 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3750 | 2024-10-09T22:52:19.885Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("f7fbb0d6-e408-4207-b1ad-c4f3b4d0e2ad"), "name": String("allow-internal-inbound"), "time_created": String("2024-10-09T22:52:19.853610676Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853610676Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("903ff0e8-949c-4a16-b455-a4ceb90eb0c8"), "name": String("allow-ssh"), "time_created": String("2024-10-09T22:52:19.853626995Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853626995Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("25e7e445-493d-4c8d-b38f-75025b1936ed"), "name": String("allow-icmp"), "time_created": String("2024-10-09T22:52:19.853668713Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853668713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}])
node_id = 14
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3751 | 2024-10-09T22:52:19.888Z | DEBG | test_utilization (SEC): saga log event
new_state = N015 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3752 | 2024-10-09T22:52:19.889Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3753 | 2024-10-09T22:52:19.892Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3754 | 2024-10-09T22:52:19.892Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3755 | 2024-10-09T22:52:19.892Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3756 | 2024-10-09T22:52:19.892Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3757 | 2024-10-09T22:52:19.893Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3758 | 2024-10-09T22:52:19.895Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3759 | 2024-10-09T22:52:19.895Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3760 | 2024-10-09T22:52:19.895Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3761 | 2024-10-09T22:52:19.896Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3762 | 2024-10-09T22:52:19.898Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3763 | 2024-10-09T22:52:19.898Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3764 | 2024-10-09T22:52:19.898Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3765 | 2024-10-09T22:52:19.899Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3766 | 2024-10-09T22:52:19.901Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3767 | 2024-10-09T22:52:19.907Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3768 | 2024-10-09T22:52:19.907Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3769 | 2024-10-09T22:52:19.907Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3770 | 2024-10-09T22:52:19.907Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3771 | 2024-10-09T22:52:19.911Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3772 | 2024-10-09T22:52:19.911Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3773 | 2024-10-09T22:52:19.911Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3774 | 2024-10-09T22:52:19.915Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3775 | 2024-10-09T22:52:19.915Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3776 | 2024-10-09T22:52:19.915Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3777 | 2024-10-09T22:52:19.919Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 55b8dcd1-c908-4045-86f2-1dfc927b3692, lookup_type: ById(55b8dcd1-c908-4045-86f2-1dfc927b3692) }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3778 | 2024-10-09T22:52:19.920Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3779 | 2024-10-09T22:52:19.920Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3780 | 2024-10-09T22:52:19.920Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3781 | 2024-10-09T22:52:19.920Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3782 | 2024-10-09T22:52:19.923Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3783 | 2024-10-09T22:52:19.923Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3784 | 2024-10-09T22:52:19.923Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3785 | 2024-10-09T22:52:19.923Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3786 | 2024-10-09T22:52:19.926Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3787 | 2024-10-09T22:52:19.926Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3788 | 2024-10-09T22:52:19.926Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3789 | 2024-10-09T22:52:19.927Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3790 | 2024-10-09T22:52:19.930Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3791 | 2024-10-09T22:52:19.938Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 55b8dcd1-c908-4045-86f2-1dfc927b3692, lookup_type: ById(55b8dcd1-c908-4045-86f2-1dfc927b3692) }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3792 | 2024-10-09T22:52:19.939Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3793 | 2024-10-09T22:52:19.939Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3794 | 2024-10-09T22:52:19.939Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcCreateGateway
|
3795 | 2024-10-09T22:52:19.947Z | DEBG | test_utilization (SEC): saga log event
new_state = N015 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3796 | 2024-10-09T22:52:19.947Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("55b8dcd1-c908-4045-86f2-1dfc927b3692"), "lookup_type": Object {"ById": String("55b8dcd1-c908-4045-86f2-1dfc927b3692")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 15
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3797 | 2024-10-09T22:52:19.951Z | DEBG | test_utilization (SEC): saga log event
new_state = N016 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3798 | 2024-10-09T22:52:19.951Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3799 | 2024-10-09T22:52:19.957Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3800 | 2024-10-09T22:52:19.957Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3801 | 2024-10-09T22:52:19.961Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3802 | 2024-10-09T22:52:19.964Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3803 | 2024-10-09T22:52:19.964Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3804 | 2024-10-09T22:52:19.964Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3805 | 2024-10-09T22:52:19.966Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3806 | 2024-10-09T22:52:19.966Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3807 | 2024-10-09T22:52:19.967Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3808 | 2024-10-09T22:52:19.969Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3809 | 2024-10-09T22:52:19.969Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3810 | 2024-10-09T22:52:19.969Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3811 | 2024-10-09T22:52:19.969Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3812 | 2024-10-09T22:52:19.969Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3813 | 2024-10-09T22:52:19.972Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3814 | 2024-10-09T22:52:19.972Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3815 | 2024-10-09T22:52:19.972Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3816 | 2024-10-09T22:52:19.972Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3817 | 2024-10-09T22:52:19.975Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3818 | 2024-10-09T22:52:19.975Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3819 | 2024-10-09T22:52:19.975Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3820 | 2024-10-09T22:52:19.976Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3821 | 2024-10-09T22:52:19.979Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3822 | 2024-10-09T22:52:19.993Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3823 | 2024-10-09T22:52:19.993Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3824 | 2024-10-09T22:52:19.993Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3825 | 2024-10-09T22:52:19.994Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3826 | 2024-10-09T22:52:19.994Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3827 | 2024-10-09T22:52:19.994Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3828 | 2024-10-09T22:52:19.997Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3829 | 2024-10-09T22:52:19.997Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3830 | 2024-10-09T22:52:19.997Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3831 | 2024-10-09T22:52:19.998Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3832 | 2024-10-09T22:52:20.002Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3833 | 2024-10-09T22:52:20.002Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3834 | 2024-10-09T22:52:20.002Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3835 | 2024-10-09T22:52:20.003Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3836 | 2024-10-09T22:52:20.007Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3837 | 2024-10-09T22:52:20.014Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3838 | 2024-10-09T22:52:20.014Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3839 | 2024-10-09T22:52:20.014Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3840 | 2024-10-09T22:52:20.015Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_node = VpcNotifySleds
|
3841 | 2024-10-09T22:52:20.030Z | DEBG | test_utilization (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {}
|
3842 | 2024-10-09T22:52:20.030Z | DEBG | test_utilization (nexus): resolved firewall rules for sled agents
sled_agent_rules = []
|
3843 | 2024-10-09T22:52:20.030Z | DEBG | test_utilization (nexus): resolved 0 rules for sleds
|
3844 | 2024-10-09T22:52:20.065Z | DEBG | test_utilization (nexus): resolved sleds for vpc default
vpc_to_sled = []
|
3845 | 2024-10-09T22:52:20.065Z | DEBG | test_utilization (nexus): sending firewall rules to sled agents
|
3846 | 2024-10-09T22:52:20.065Z | INFO | test_utilization (nexus): updated firewall rules on 0 sleds
|
3847 | 2024-10-09T22:52:20.065Z | DEBG | test_utilization (SEC): saga log event
new_state = N016 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3848 | 2024-10-09T22:52:20.065Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 16
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3849 | 2024-10-09T22:52:20.073Z | DEBG | test_utilization (SEC): saga log event
new_state = N017 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3850 | 2024-10-09T22:52:20.073Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3851 | 2024-10-09T22:52:20.079Z | DEBG | test_utilization (SEC): saga log event
new_state = N017 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3852 | 2024-10-09T22:52:20.080Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 17
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3853 | 2024-10-09T22:52:20.083Z | DEBG | test_utilization (SEC): saga log event
new_state = N019 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3854 | 2024-10-09T22:52:20.084Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3855 | 2024-10-09T22:52:20.087Z | DEBG | test_utilization (SEC): saga log event
new_state = N019 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3856 | 2024-10-09T22:52:20.087Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 19
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3857 | 2024-10-09T22:52:20.090Z | INFO | test_utilization (SEC): update for saga cached state
new_state = Done
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3858 | 2024-10-09T22:52:20.090Z | INFO | test_utilization (SecStore): updating state
new_state = done
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
|
3859 | 2024-10-09T22:52:20.141Z | INFO | test_utilization (SEC): saga finished
result = success
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3860 | 2024-10-09T22:52:20.141Z | INFO | test_utilization (SagaExecutor): saga finished
saga_id = 1dcb38c4-8fea-4e88-a704-0bbe3893f51d
saga_name = project-create
saga_result = SagaResult { saga_id: 1dcb38c4-8fea-4e88-a704-0bbe3893f51d, saga_log: SagaLog { saga_id: 1dcb38c4-8fea-4e88-a704-0bbe3893f51d, unwinding: false, events: [N018 started, N018 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N019 started, N019 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "name": String("utilization-test-project"), "time_created": String("2024-10-09T22:52:19.469094Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.469094Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6a:4928:7900::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("88f461fb-16a8-43c7-b5d3-b42110c60a94")), 4: Succeeded(String("3840fbbb-7c81-4ba0-916c-7b54122ff416")), 5: Succeeded(String("39bffe36-848b-4d5a-85b7-06db0dccf665")), 6: Succeeded(String("b7517d09-24b8-4c2d-b522-cba37c3ad63f")), 7: Succeeded(String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0")), 8: Succeeded(String("55b8dcd1-c908-4045-86f2-1dfc927b3692")), 9: Succeeded(Array [Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "name": String("default"), "time_created": String("2024-10-09T22:52:19.579105Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.579105Z")}, "ipv6_prefix": String("fd6a:4928:7900::/48"), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "subnet_gen": Number(1), "system_router_id": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "vni": Number(8221063)}]), 10: Succeeded(Object {"key": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "lookup_type": Object {"ById": String("3840fbbb-7c81-4ba0-916c-7b54122ff416")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 11: Succeeded(Null), 12: Succeeded(Null), 13: Succeeded(Array [Object {"key": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "lookup_type": Object {"ById": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "name": String("default"), "time_created": String("2024-10-09T22:52:19.792397Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.792397Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:4928:7900::/64"), "rcgen": Number(1), "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}]), 14: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("f7fbb0d6-e408-4207-b1ad-c4f3b4d0e2ad"), "name": String("allow-internal-inbound"), "time_created": String("2024-10-09T22:52:19.853610676Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853610676Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("903ff0e8-949c-4a16-b455-a4ceb90eb0c8"), "name": String("allow-ssh"), "time_created": String("2024-10-09T22:52:19.853626995Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853626995Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("25e7e445-493d-4c8d-b38f-75025b1936ed"), "name": String("allow-icmp"), "time_created": String("2024-10-09T22:52:19.853668713Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853668713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}]), 15: Succeeded(Object {"key": String("55b8dcd1-c908-4045-86f2-1dfc927b3692"), "lookup_type": Object {"ById": String("55b8dcd1-c908-4045-86f2-1dfc927b3692")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("55b8dcd1-c908-4045-86f2-1dfc927b3692"), "default_subnet_id": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "default_v4_route_id": String("39bffe36-848b-4d5a-85b7-06db0dccf665"), "default_v6_route_id": String("b7517d09-24b8-4c2d-b522-cba37c3ad63f"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("f7fbb0d6-e408-4207-b1ad-c4f3b4d0e2ad"), "name": String("allow-internal-inbound"), "time_created": String("2024-10-09T22:52:19.853610676Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853610676Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("903ff0e8-949c-4a16-b455-a4ceb90eb0c8"), "name": String("allow-ssh"), "time_created": String("2024-10-09T22:52:19.853626995Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853626995Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("25e7e445-493d-4c8d-b38f-75025b1936ed"), "name": String("allow-icmp"), "time_created": String("2024-10-09T22:52:19.853668713Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.853668713Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}], "gateway": Object {"key": String("55b8dcd1-c908-4045-86f2-1dfc927b3692"), "lookup_type": Object {"ById": String("55b8dcd1-c908-4045-86f2-1dfc927b3692")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "name": String("utilization-test-project"), "time_created": String("2024-10-09T22:52:19.469094Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.469094Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route4": Null, "route6": Null, "router": Object {"key": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "lookup_type": Object {"ById": String("3840fbbb-7c81-4ba0-916c-7b54122ff416")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "lookup_type": Object {"ById": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0")}, "parent": Object {"key": String("88f461fb-16a8-43c7-b5d3-b42110c60a94"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("986abfd5-df4c-4a54-a5f1-2b1ea54179c0"), "name": String("default"), "time_created": String("2024-10-09T22:52:19.792397Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:19.792397Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd6a:4928:7900::/64"), "rcgen": Number(1), "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")}], "system_router_id": String("3840fbbb-7c81-4ba0-916c-7b54122ff416"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("bc93506d-8840-4506-aa4b-ed0643818506"), "lookup_type": Object {"ByName": String("utilization-test-project")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd6a:4928:7900::/48"), "name": String("default")}}, "vpc_id": String("88f461fb-16a8-43c7-b5d3-b42110c60a94")} }) }
|
3861 | 2024-10-09T22:52:20.142Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 780786
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = bf4b7bd4-abd7-4100-937a-34a2a57f8e59
response_code = 201
uri = /v1/projects
|
3862 | 2024-10-09T22:52:20.142Z | INFO | test_utilization (external client test context): client received response
status = 201
|
3863 | 2024-10-09T22:52:20.143Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/instances?project=utilization-test-project
|
3864 | 2024-10-09T22:52:20.146Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
uri = /v1/instances?project=utilization-test-project
|
3865 | 2024-10-09T22:52:20.147Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
uri = /v1/instances?project=utilization-test-project
|
3866 | 2024-10-09T22:52:20.148Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances?project=utilization-test-project
|
3867 | 2024-10-09T22:52:20.148Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3868 | 2024-10-09T22:52:20.148Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3869 | 2024-10-09T22:52:20.149Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3870 | 2024-10-09T22:52:20.154Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3871 | 2024-10-09T22:52:20.154Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3872 | 2024-10-09T22:52:20.154Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3873 | 2024-10-09T22:52:20.161Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3874 | 2024-10-09T22:52:20.161Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3875 | 2024-10-09T22:52:20.161Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3876 | 2024-10-09T22:52:20.161Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3877 | 2024-10-09T22:52:20.162Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3878 | 2024-10-09T22:52:20.171Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3879 | 2024-10-09T22:52:20.171Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3880 | 2024-10-09T22:52:20.171Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3881 | 2024-10-09T22:52:20.172Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3882 | 2024-10-09T22:52:20.174Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3883 | 2024-10-09T22:52:20.178Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3884 | 2024-10-09T22:52:20.178Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3885 | 2024-10-09T22:52:20.178Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3886 | 2024-10-09T22:52:20.178Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3887 | 2024-10-09T22:52:20.180Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3888 | 2024-10-09T22:52:20.180Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3889 | 2024-10-09T22:52:20.180Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3890 | 2024-10-09T22:52:20.180Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3891 | 2024-10-09T22:52:20.181Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3892 | 2024-10-09T22:52:20.182Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3893 | 2024-10-09T22:52:20.182Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3894 | 2024-10-09T22:52:20.182Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3895 | 2024-10-09T22:52:20.183Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3896 | 2024-10-09T22:52:20.185Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3897 | 2024-10-09T22:52:20.188Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3898 | 2024-10-09T22:52:20.188Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
uri = /v1/instances?project=utilization-test-project
|
3899 | 2024-10-09T22:52:20.189Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3900 | 2024-10-09T22:52:20.189Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3901 | 2024-10-09T22:52:20.189Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3902 | 2024-10-09T22:52:20.193Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3903 | 2024-10-09T22:52:20.193Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3904 | 2024-10-09T22:52:20.193Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3905 | 2024-10-09T22:52:20.197Z | TRAC | test_utilization (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }
uri = /v1/instances?project=utilization-test-project
|
3906 | 2024-10-09T22:52:20.197Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
3907 | 2024-10-09T22:52:20.197Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3908 | 2024-10-09T22:52:20.197Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3909 | 2024-10-09T22:52:20.198Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3910 | 2024-10-09T22:52:20.200Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
3911 | 2024-10-09T22:52:20.200Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3912 | 2024-10-09T22:52:20.200Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3913 | 2024-10-09T22:52:20.201Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3914 | 2024-10-09T22:52:20.201Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3915 | 2024-10-09T22:52:20.202Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
3916 | 2024-10-09T22:52:20.202Z | DEBG | test_utilization (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
3917 | 2024-10-09T22:52:20.202Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = SELECT * FROM oximeter.timeseries_schema FORMAT JSONEachRow;
|
3918 | 2024-10-09T22:52:20.205Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
3919 | 2024-10-09T22:52:20.205Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3920 | 2024-10-09T22:52:20.205Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3921 | 2024-10-09T22:52:20.205Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3922 | 2024-10-09T22:52:20.207Z | TRAC | test_utilization (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
3923 | 2024-10-09T22:52:20.207Z | DEBG | test_utilization (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
schema = {"timeseries_name":"integration_target:integration_metric","fields.name":["metric_name","target_name"],"fields.type":["String","String"],"fields.source":["Metric","Target"],"datum_type":"I64","created":"2024-10-09 22:52:20.202681754"}
timeseries_name = integration_target:integration_metric
|
3924 | 2024-10-09T22:52:20.207Z | DEBG | test_utilization (clickhouse-client): inserting 1 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
3925 | 2024-10-09T22:52:20.207Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.timeseries_schema FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","fields.name":["metric_name","target_name"],"fields.type":["String","String"],"fields.source":["Metric","Target"],"datum_type":"I64","created":"2024-10-09 22:52:20.202681754"}\n
|
3926 | 2024-10-09T22:52:20.209Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
3927 | 2024-10-09T22:52:20.214Z | DEBG | test_utilization (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3928 | 2024-10-09T22:52:20.214Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3929 | 2024-10-09T22:52:20.214Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3930 | 2024-10-09T22:52:20.215Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3931 | 2024-10-09T22:52:20.216Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
3932 | 2024-10-09T22:52:20.217Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3933 | 2024-10-09T22:52:20.217Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3934 | 2024-10-09T22:52:20.218Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3935 | 2024-10-09T22:52:20.221Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
3936 | 2024-10-09T22:52:20.221Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:19.528128340","datum":0}\n
|
3937 | 2024-10-09T22:52:20.222Z | TRAC | test_utilization (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
uri = /v1/instances?project=utilization-test-project
|
3938 | 2024-10-09T22:52:20.222Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
3939 | 2024-10-09T22:52:20.223Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3940 | 2024-10-09T22:52:20.223Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3941 | 2024-10-09T22:52:20.223Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3942 | 2024-10-09T22:52:20.224Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
3943 | 2024-10-09T22:52:20.224Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3944 | 2024-10-09T22:52:20.226Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
3945 | 2024-10-09T22:52:20.226Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3946 | 2024-10-09T22:52:20.227Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3947 | 2024-10-09T22:52:20.227Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3948 | 2024-10-09T22:52:20.230Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
3949 | 2024-10-09T22:52:20.232Z | DEBG | test_utilization (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3950 | 2024-10-09T22:52:20.232Z | TRAC | test_utilization (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
uri = /v1/instances?project=utilization-test-project
|
3951 | 2024-10-09T22:52:20.233Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
3952 | 2024-10-09T22:52:20.233Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3953 | 2024-10-09T22:52:20.233Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3954 | 2024-10-09T22:52:20.233Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3955 | 2024-10-09T22:52:20.236Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
3956 | 2024-10-09T22:52:20.236Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3957 | 2024-10-09T22:52:20.236Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3958 | 2024-10-09T22:52:20.237Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3959 | 2024-10-09T22:52:20.240Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
3960 | 2024-10-09T22:52:20.242Z | DEBG | test_utilization (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3961 | 2024-10-09T22:52:20.242Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
3962 | 2024-10-09T22:52:20.242Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
3963 | 2024-10-09T22:52:20.243Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
3964 | 2024-10-09T22:52:20.249Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
|
3965 | 2024-10-09T22:52:20.249Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3966 | 2024-10-09T22:52:20.249Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
3967 | 2024-10-09T22:52:20.249Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
3968 | 2024-10-09T22:52:20.251Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
3969 | 2024-10-09T22:52:20.253Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
3970 | 2024-10-09T22:52:20.257Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
result = Ok(())
|
3971 | 2024-10-09T22:52:20.257Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
3972 | 2024-10-09T22:52:20.258Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
3973 | 2024-10-09T22:52:20.258Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
3974 | 2024-10-09T22:52:20.276Z | INFO | test_utilization (SagaExecutor): preparing saga
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
|
3975 | 2024-10-09T22:52:20.280Z | INFO | test_utilization (SEC): saga create
dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"80d20301-e96d-4dc3-a0b3-ffda8be242f6"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"7fab3021-94e6-4b8c-b3d7-a08048b00e47","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"63aa3793-c46b-4496-aec7-f6ffcb73f055","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"9e99c281-26b0-4b2c-9ff5-d09df34760c9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"05c44e1d-6dfa-40a5-bc3e-d82d31031270","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"2615f582-9e49-4076-b807-b0a05c74ba74","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"0bb738d5-fd52-48fb-8743-9b1b00d4b6df","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"d9369908-4e97-4240-9079-10ff9a3d6f58","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"38e5bcac-f89f-4852-a65e-f32764ffd690","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"0c49f2bd-68d2-42e0-94f6-9743edac67ef","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"f30a5e5d-d85e-4ed7-87c5-8ef9bf5d0263","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"8d6ed561-c206-441c-82f0-2d2c8dfc2fff","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"6d6552f3-d0d7-4c33-aecb-61afacc69ea8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"9878641e-15e1-4420-ba2a-eff3f705c57a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"d040bc93-d17c-4802-bf66-cb4e70528fc7","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"09571873-401c-46d9-9a91-bce49f3adbff","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"13f38b8c-e7d5-43d9-b7ce-7ff1043b9479","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"fa14058e-b426-43e4-8e72-1758f9627b6d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"dc21f576-55dd-4d00-a40b-9ab4656cdc19","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"62be35ee-9cb1-48dd-88ab-1904ee3b78b3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"2b7bf2a6-efe3-4e9a-b2b0-16d1aafb06cc","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"3fe8375b-3d13-4e0b-ab2a-e9ee66894203","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"c4cec854-dcf2-4b85-9e97-1895fe75ad58","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"e8db60e5-2693-4c37-a450-e56ff87c50e2","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"2c393be5-8ca0-451d-a2bf-5a33f17df3c0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"9d9c1904-8189-45a6-be5b-1b6aa8bd4b51","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"aff35c8c-f729-41e6-9769-be86fed938ef","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"f5826e28-7b49-4da1-bbf6-1858a7021d65","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"3bd36d4d-c0cc-4cb8-84d6-1a0612246629","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"968fe93f-ca8e-4ca1-8e02-51d6b1e39164","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"daed1120-f7c9-4a78-aa8a-4ba5ed21f149","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"536265c9-d618-4a38-b788-bf0f584062d8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"c603bed4-18d9-4250-965c-647ba194fa88","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"07605532-9e8c-49d7-8b16-0e39754c9d90","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"670083fb-8463-4124-8467-503e2a6bf33c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"3bb3ea71-bb81-427f-8922-ece08c84881b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"69003053-edcf-48c1-bbb3-fa0c0db287cd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"7b5a1476-4e3b-4099-9ffc-7dfb44a7c251","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"f255b540-23e4-41f1-bd84-d6e7c30c7cb9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"1eb7874f-a60d-45aa-98eb-c4b9bf41b172","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","new_id":"641c62fc-11ca-4510-825d-80c592678fca","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"utilization-test-instance\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"utilization-test-instance","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167}
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3976 | 2024-10-09T22:52:20.283Z | INFO | test_utilization (SecStore): creating saga
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
|
3977 | 2024-10-09T22:52:20.297Z | INFO | test_utilization (SagaExecutor): starting saga
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
|
3978 | 2024-10-09T22:52:20.297Z | INFO | test_utilization (SEC): saga start
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3979 | 2024-10-09T22:52:20.297Z | DEBG | test_utilization (SEC): saga log event
new_state = N167 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3980 | 2024-10-09T22:52:20.297Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 167
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
3981 | 2024-10-09T22:52:20.300Z | DEBG | test_utilization (SEC): saga log event
new_state = N167 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3982 | 2024-10-09T22:52:20.300Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 167
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
3983 | 2024-10-09T22:52:20.304Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3984 | 2024-10-09T22:52:20.304Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
3985 | 2024-10-09T22:52:20.307Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3986 | 2024-10-09T22:52:20.307Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"))
node_id = 0
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
3987 | 2024-10-09T22:52:20.310Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
3988 | 2024-10-09T22:52:20.310Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
3989 | 2024-10-09T22:52:20.314Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3990 | 2024-10-09T22:52:20.314Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3991 | 2024-10-09T22:52:20.314Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3992 | 2024-10-09T22:52:20.316Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3993 | 2024-10-09T22:52:20.316Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3994 | 2024-10-09T22:52:20.316Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3995 | 2024-10-09T22:52:20.318Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3996 | 2024-10-09T22:52:20.318Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3997 | 2024-10-09T22:52:20.318Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3998 | 2024-10-09T22:52:20.318Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3999 | 2024-10-09T22:52:20.319Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4000 | 2024-10-09T22:52:20.321Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4001 | 2024-10-09T22:52:20.321Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4002 | 2024-10-09T22:52:20.321Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4003 | 2024-10-09T22:52:20.322Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4004 | 2024-10-09T22:52:20.324Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4005 | 2024-10-09T22:52:20.324Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4006 | 2024-10-09T22:52:20.324Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4007 | 2024-10-09T22:52:20.324Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4008 | 2024-10-09T22:52:20.327Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4009 | 2024-10-09T22:52:20.332Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4010 | 2024-10-09T22:52:20.333Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4011 | 2024-10-09T22:52:20.333Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4012 | 2024-10-09T22:52:20.333Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4013 | 2024-10-09T22:52:20.333Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4014 | 2024-10-09T22:52:20.333Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4015 | 2024-10-09T22:52:20.335Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4016 | 2024-10-09T22:52:20.335Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4017 | 2024-10-09T22:52:20.335Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4018 | 2024-10-09T22:52:20.336Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4019 | 2024-10-09T22:52:20.338Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4020 | 2024-10-09T22:52:20.338Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4021 | 2024-10-09T22:52:20.338Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4022 | 2024-10-09T22:52:20.339Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4023 | 2024-10-09T22:52:20.341Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4024 | 2024-10-09T22:52:20.346Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4025 | 2024-10-09T22:52:20.346Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4026 | 2024-10-09T22:52:20.346Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4027 | 2024-10-09T22:52:20.347Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateInstanceRecord
|
4028 | 2024-10-09T22:52:20.405Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4029 | 2024-10-09T22:52:20.405Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]})
node_id = 1
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4030 | 2024-10-09T22:52:20.410Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4031 | 2024-10-09T22:52:20.410Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4032 | 2024-10-09T22:52:20.415Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4033 | 2024-10-09T22:52:20.415Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4034 | 2024-10-09T22:52:20.416Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4035 | 2024-10-09T22:52:20.419Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4036 | 2024-10-09T22:52:20.419Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4037 | 2024-10-09T22:52:20.421Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4038 | 2024-10-09T22:52:20.423Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4039 | 2024-10-09T22:52:20.423Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4040 | 2024-10-09T22:52:20.423Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4041 | 2024-10-09T22:52:20.423Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4042 | 2024-10-09T22:52:20.424Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4043 | 2024-10-09T22:52:20.426Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4044 | 2024-10-09T22:52:20.427Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4045 | 2024-10-09T22:52:20.427Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4046 | 2024-10-09T22:52:20.427Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4047 | 2024-10-09T22:52:20.431Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4048 | 2024-10-09T22:52:20.433Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4049 | 2024-10-09T22:52:20.433Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4050 | 2024-10-09T22:52:20.433Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4051 | 2024-10-09T22:52:20.433Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4052 | 2024-10-09T22:52:20.433Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4053 | 2024-10-09T22:52:20.433Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4054 | 2024-10-09T22:52:20.437Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4055 | 2024-10-09T22:52:20.437Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4056 | 2024-10-09T22:52:20.437Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4057 | 2024-10-09T22:52:20.439Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4058 | 2024-10-09T22:52:20.447Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4059 | 2024-10-09T22:52:20.451Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = AssociateSshKeys
|
4060 | 2024-10-09T22:52:20.451Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4061 | 2024-10-09T22:52:20.451Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4062 | 2024-10-09T22:52:20.456Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4063 | 2024-10-09T22:52:20.456Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4064 | 2024-10-09T22:52:20.461Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4065 | 2024-10-09T22:52:20.461Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7fab3021-94e6-4b8c-b3d7-a08048b00e47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)})
node_id = 3
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4066 | 2024-10-09T22:52:20.465Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4067 | 2024-10-09T22:52:20.465Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4068 | 2024-10-09T22:52:20.469Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4069 | 2024-10-09T22:52:20.469Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 4
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4070 | 2024-10-09T22:52:20.473Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4071 | 2024-10-09T22:52:20.473Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4072 | 2024-10-09T22:52:20.477Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4073 | 2024-10-09T22:52:20.477Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4074 | 2024-10-09T22:52:20.478Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4075 | 2024-10-09T22:52:20.481Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4076 | 2024-10-09T22:52:20.481Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4077 | 2024-10-09T22:52:20.481Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4078 | 2024-10-09T22:52:20.483Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4079 | 2024-10-09T22:52:20.483Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4080 | 2024-10-09T22:52:20.484Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4081 | 2024-10-09T22:52:20.487Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4082 | 2024-10-09T22:52:20.487Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4083 | 2024-10-09T22:52:20.487Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4084 | 2024-10-09T22:52:20.487Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4085 | 2024-10-09T22:52:20.488Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4086 | 2024-10-09T22:52:20.493Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4087 | 2024-10-09T22:52:20.493Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4088 | 2024-10-09T22:52:20.493Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4089 | 2024-10-09T22:52:20.493Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4090 | 2024-10-09T22:52:20.496Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4091 | 2024-10-09T22:52:20.496Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4092 | 2024-10-09T22:52:20.496Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4093 | 2024-10-09T22:52:20.497Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4094 | 2024-10-09T22:52:20.500Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4095 | 2024-10-09T22:52:20.506Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4096 | 2024-10-09T22:52:20.507Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4097 | 2024-10-09T22:52:20.507Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4098 | 2024-10-09T22:52:20.509Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4099 | 2024-10-09T22:52:20.511Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4100 | 2024-10-09T22:52:20.511Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4101 | 2024-10-09T22:52:20.512Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4102 | 2024-10-09T22:52:20.514Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4103 | 2024-10-09T22:52:20.514Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4104 | 2024-10-09T22:52:20.515Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4105 | 2024-10-09T22:52:20.516Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4106 | 2024-10-09T22:52:20.518Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4107 | 2024-10-09T22:52:20.518Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4108 | 2024-10-09T22:52:20.520Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4109 | 2024-10-09T22:52:20.520Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4110 | 2024-10-09T22:52:20.520Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4111 | 2024-10-09T22:52:20.520Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4112 | 2024-10-09T22:52:20.521Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4113 | 2024-10-09T22:52:20.523Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4114 | 2024-10-09T22:52:20.523Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4115 | 2024-10-09T22:52:20.523Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4116 | 2024-10-09T22:52:20.524Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4117 | 2024-10-09T22:52:20.526Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4118 | 2024-10-09T22:52:20.526Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4119 | 2024-10-09T22:52:20.526Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4120 | 2024-10-09T22:52:20.526Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4121 | 2024-10-09T22:52:20.527Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4122 | 2024-10-09T22:52:20.529Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4123 | 2024-10-09T22:52:20.530Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4124 | 2024-10-09T22:52:20.538Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4125 | 2024-10-09T22:52:20.538Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4126 | 2024-10-09T22:52:20.538Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4127 | 2024-10-09T22:52:20.538Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4128 | 2024-10-09T22:52:20.539Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4129 | 2024-10-09T22:52:20.539Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4130 | 2024-10-09T22:52:20.542Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4131 | 2024-10-09T22:52:20.542Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4132 | 2024-10-09T22:52:20.542Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4133 | 2024-10-09T22:52:20.543Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4134 | 2024-10-09T22:52:20.545Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4135 | 2024-10-09T22:52:20.546Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4136 | 2024-10-09T22:52:20.546Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4137 | 2024-10-09T22:52:20.546Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4138 | 2024-10-09T22:52:20.549Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4139 | 2024-10-09T22:52:20.556Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4140 | 2024-10-09T22:52:20.556Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4141 | 2024-10-09T22:52:20.556Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4142 | 2024-10-09T22:52:20.556Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4143 | 2024-10-09T22:52:20.556Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4144 | 2024-10-09T22:52:20.557Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4145 | 2024-10-09T22:52:20.560Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4146 | 2024-10-09T22:52:20.560Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4147 | 2024-10-09T22:52:20.560Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4148 | 2024-10-09T22:52:20.562Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4149 | 2024-10-09T22:52:20.565Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4150 | 2024-10-09T22:52:20.565Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4151 | 2024-10-09T22:52:20.565Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4152 | 2024-10-09T22:52:20.565Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4153 | 2024-10-09T22:52:20.568Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4154 | 2024-10-09T22:52:20.576Z | DEBG | test_utilization (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4155 | 2024-10-09T22:52:20.576Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4156 | 2024-10-09T22:52:20.576Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4157 | 2024-10-09T22:52:20.577Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4158 | 2024-10-09T22:52:20.608Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4159 | 2024-10-09T22:52:20.609Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4160 | 2024-10-09T22:52:20.609Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
4161 | 2024-10-09T22:52:20.614Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4162 | 2024-10-09T22:52:20.614Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 5
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4163 | 2024-10-09T22:52:20.619Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4164 | 2024-10-09T22:52:20.619Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4165 | 2024-10-09T22:52:20.622Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4166 | 2024-10-09T22:52:20.622Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 6
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4167 | 2024-10-09T22:52:20.625Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4168 | 2024-10-09T22:52:20.625Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4169 | 2024-10-09T22:52:20.629Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4170 | 2024-10-09T22:52:20.629Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("63aa3793-c46b-4496-aec7-f6ffcb73f055"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)})
node_id = 7
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4171 | 2024-10-09T22:52:20.633Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4172 | 2024-10-09T22:52:20.633Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4173 | 2024-10-09T22:52:20.636Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4174 | 2024-10-09T22:52:20.636Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 8
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4175 | 2024-10-09T22:52:20.640Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4176 | 2024-10-09T22:52:20.640Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4177 | 2024-10-09T22:52:20.644Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4178 | 2024-10-09T22:52:20.644Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 9
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4179 | 2024-10-09T22:52:20.648Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4180 | 2024-10-09T22:52:20.648Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4181 | 2024-10-09T22:52:20.651Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4182 | 2024-10-09T22:52:20.651Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 10
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4183 | 2024-10-09T22:52:20.656Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4184 | 2024-10-09T22:52:20.656Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4185 | 2024-10-09T22:52:20.664Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4186 | 2024-10-09T22:52:20.664Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9e99c281-26b0-4b2c-9ff5-d09df34760c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)})
node_id = 11
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4187 | 2024-10-09T22:52:20.669Z | DEBG | test_utilization (SEC): saga log event
new_state = N012 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4188 | 2024-10-09T22:52:20.669Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4189 | 2024-10-09T22:52:20.673Z | DEBG | test_utilization (SEC): saga log event
new_state = N012 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4190 | 2024-10-09T22:52:20.673Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4191 | 2024-10-09T22:52:20.679Z | DEBG | test_utilization (SEC): saga log event
new_state = N013 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4192 | 2024-10-09T22:52:20.679Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4193 | 2024-10-09T22:52:20.683Z | DEBG | test_utilization (SEC): saga log event
new_state = N013 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4194 | 2024-10-09T22:52:20.683Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 13
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4195 | 2024-10-09T22:52:20.686Z | DEBG | test_utilization (SEC): saga log event
new_state = N014 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4196 | 2024-10-09T22:52:20.686Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4197 | 2024-10-09T22:52:20.690Z | DEBG | test_utilization (SEC): saga log event
new_state = N014 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4198 | 2024-10-09T22:52:20.690Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 14
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4199 | 2024-10-09T22:52:20.695Z | DEBG | test_utilization (SEC): saga log event
new_state = N015 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4200 | 2024-10-09T22:52:20.695Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4201 | 2024-10-09T22:52:20.699Z | DEBG | test_utilization (SEC): saga log event
new_state = N015 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4202 | 2024-10-09T22:52:20.699Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("05c44e1d-6dfa-40a5-bc3e-d82d31031270"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)})
node_id = 15
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4203 | 2024-10-09T22:52:20.703Z | DEBG | test_utilization (SEC): saga log event
new_state = N016 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4204 | 2024-10-09T22:52:20.703Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4205 | 2024-10-09T22:52:20.708Z | DEBG | test_utilization (SEC): saga log event
new_state = N016 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4206 | 2024-10-09T22:52:20.708Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 16
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4207 | 2024-10-09T22:52:20.711Z | DEBG | test_utilization (SEC): saga log event
new_state = N017 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4208 | 2024-10-09T22:52:20.711Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4209 | 2024-10-09T22:52:20.715Z | DEBG | test_utilization (SEC): saga log event
new_state = N017 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4210 | 2024-10-09T22:52:20.715Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 17
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4211 | 2024-10-09T22:52:20.718Z | DEBG | test_utilization (SEC): saga log event
new_state = N018 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4212 | 2024-10-09T22:52:20.718Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4213 | 2024-10-09T22:52:20.724Z | DEBG | test_utilization (SEC): saga log event
new_state = N018 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4214 | 2024-10-09T22:52:20.724Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4215 | 2024-10-09T22:52:20.728Z | DEBG | test_utilization (SEC): saga log event
new_state = N019 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4216 | 2024-10-09T22:52:20.728Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4217 | 2024-10-09T22:52:20.731Z | DEBG | test_utilization (SEC): saga log event
new_state = N019 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4218 | 2024-10-09T22:52:20.731Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2615f582-9e49-4076-b807-b0a05c74ba74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)})
node_id = 19
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4219 | 2024-10-09T22:52:20.735Z | DEBG | test_utilization (SEC): saga log event
new_state = N020 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4220 | 2024-10-09T22:52:20.735Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 20
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4221 | 2024-10-09T22:52:20.738Z | DEBG | test_utilization (SEC): saga log event
new_state = N020 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4222 | 2024-10-09T22:52:20.739Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 20
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4223 | 2024-10-09T22:52:20.743Z | DEBG | test_utilization (SEC): saga log event
new_state = N021 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4224 | 2024-10-09T22:52:20.743Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 21
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4225 | 2024-10-09T22:52:20.746Z | DEBG | test_utilization (SEC): saga log event
new_state = N021 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4226 | 2024-10-09T22:52:20.746Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 21
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4227 | 2024-10-09T22:52:20.751Z | DEBG | test_utilization (SEC): saga log event
new_state = N022 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4228 | 2024-10-09T22:52:20.752Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 22
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4229 | 2024-10-09T22:52:20.755Z | DEBG | test_utilization (SEC): saga log event
new_state = N022 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4230 | 2024-10-09T22:52:20.755Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 22
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4231 | 2024-10-09T22:52:20.760Z | DEBG | test_utilization (SEC): saga log event
new_state = N023 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4232 | 2024-10-09T22:52:20.760Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 23
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4233 | 2024-10-09T22:52:20.764Z | DEBG | test_utilization (SEC): saga log event
new_state = N023 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4234 | 2024-10-09T22:52:20.764Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0bb738d5-fd52-48fb-8743-9b1b00d4b6df"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)})
node_id = 23
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4235 | 2024-10-09T22:52:20.768Z | DEBG | test_utilization (SEC): saga log event
new_state = N024 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4236 | 2024-10-09T22:52:20.768Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 24
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4237 | 2024-10-09T22:52:20.772Z | DEBG | test_utilization (SEC): saga log event
new_state = N024 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4238 | 2024-10-09T22:52:20.772Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 24
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4239 | 2024-10-09T22:52:20.775Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
4240 | 2024-10-09T22:52:20.776Z | DEBG | test_utilization (SEC): saga log event
new_state = N025 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4241 | 2024-10-09T22:52:20.776Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 25
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4242 | 2024-10-09T22:52:20.778Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 2.226679639s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
4243 | 2024-10-09T22:52:20.780Z | DEBG | test_utilization (SEC): saga log event
new_state = N025 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4244 | 2024-10-09T22:52:20.780Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 25
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4245 | 2024-10-09T22:52:20.783Z | DEBG | test_utilization (SEC): saga log event
new_state = N026 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4246 | 2024-10-09T22:52:20.783Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 26
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4247 | 2024-10-09T22:52:20.787Z | DEBG | test_utilization (SEC): saga log event
new_state = N026 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4248 | 2024-10-09T22:52:20.787Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 26
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4249 | 2024-10-09T22:52:20.791Z | DEBG | test_utilization (SEC): saga log event
new_state = N027 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4250 | 2024-10-09T22:52:20.791Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 27
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4251 | 2024-10-09T22:52:20.794Z | DEBG | test_utilization (SEC): saga log event
new_state = N027 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4252 | 2024-10-09T22:52:20.794Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d9369908-4e97-4240-9079-10ff9a3d6f58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)})
node_id = 27
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4253 | 2024-10-09T22:52:20.798Z | DEBG | test_utilization (SEC): saga log event
new_state = N028 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4254 | 2024-10-09T22:52:20.798Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 28
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4255 | 2024-10-09T22:52:20.802Z | DEBG | test_utilization (SEC): saga log event
new_state = N028 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4256 | 2024-10-09T22:52:20.802Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 28
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4257 | 2024-10-09T22:52:20.805Z | DEBG | test_utilization (SEC): saga log event
new_state = N029 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4258 | 2024-10-09T22:52:20.805Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 29
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4259 | 2024-10-09T22:52:20.809Z | DEBG | test_utilization (SEC): saga log event
new_state = N029 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4260 | 2024-10-09T22:52:20.809Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 29
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4261 | 2024-10-09T22:52:20.813Z | DEBG | test_utilization (SEC): saga log event
new_state = N030 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4262 | 2024-10-09T22:52:20.813Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 30
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4263 | 2024-10-09T22:52:20.817Z | DEBG | test_utilization (SEC): saga log event
new_state = N030 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4264 | 2024-10-09T22:52:20.817Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 30
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4265 | 2024-10-09T22:52:20.821Z | DEBG | test_utilization (SEC): saga log event
new_state = N031 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4266 | 2024-10-09T22:52:20.821Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 31
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4267 | 2024-10-09T22:52:20.824Z | DEBG | test_utilization (SEC): saga log event
new_state = N031 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4268 | 2024-10-09T22:52:20.824Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("38e5bcac-f89f-4852-a65e-f32764ffd690"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)})
node_id = 31
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4269 | 2024-10-09T22:52:20.828Z | DEBG | test_utilization (SEC): saga log event
new_state = N032 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4270 | 2024-10-09T22:52:20.828Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 32
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4271 | 2024-10-09T22:52:20.832Z | DEBG | test_utilization (SEC): saga log event
new_state = N032 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4272 | 2024-10-09T22:52:20.832Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 32
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4273 | 2024-10-09T22:52:20.836Z | DEBG | test_utilization (SEC): saga log event
new_state = N033 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4274 | 2024-10-09T22:52:20.836Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 33
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4275 | 2024-10-09T22:52:20.840Z | DEBG | test_utilization (SEC): saga log event
new_state = N033 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4276 | 2024-10-09T22:52:20.840Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 33
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4277 | 2024-10-09T22:52:20.843Z | DEBG | test_utilization (SEC): saga log event
new_state = N034 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4278 | 2024-10-09T22:52:20.843Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 34
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4279 | 2024-10-09T22:52:20.847Z | DEBG | test_utilization (SEC): saga log event
new_state = N034 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4280 | 2024-10-09T22:52:20.847Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 34
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4281 | 2024-10-09T22:52:20.850Z | DEBG | test_utilization (SEC): saga log event
new_state = N035 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4282 | 2024-10-09T22:52:20.850Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 35
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4283 | 2024-10-09T22:52:20.854Z | DEBG | test_utilization (SEC): saga log event
new_state = N035 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4284 | 2024-10-09T22:52:20.854Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("7b95e66d-8785-45e7-9b30-32fab3dbaa9c"))
node_id = 35
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4285 | 2024-10-09T22:52:20.857Z | DEBG | test_utilization (SEC): saga log event
new_state = N036 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4286 | 2024-10-09T22:52:20.857Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 36
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4287 | 2024-10-09T22:52:20.861Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4288 | 2024-10-09T22:52:20.861Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4289 | 2024-10-09T22:52:20.862Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4290 | 2024-10-09T22:52:20.866Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4291 | 2024-10-09T22:52:20.866Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4292 | 2024-10-09T22:52:20.870Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_node = CreateSnatIp
|
4293 | 2024-10-09T22:52:21.201Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4294 | 2024-10-09T22:52:21.201Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
4295 | 2024-10-09T22:52:21.202Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
4296 | 2024-10-09T22:52:21.207Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
4297 | 2024-10-09T22:52:21.207Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:20.527843676","datum":1}\n
|
4298 | 2024-10-09T22:52:21.211Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
4299 | 2024-10-09T22:52:21.213Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4300 | 2024-10-09T22:52:21.296Z | DEBG | test_utilization (SEC): saga log event
new_state = N036 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4301 | 2024-10-09T22:52:21.296Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 36
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4302 | 2024-10-09T22:52:21.303Z | DEBG | test_utilization (SEC): saga log event
new_state = N037 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4303 | 2024-10-09T22:52:21.303Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 37
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4304 | 2024-10-09T22:52:21.307Z | DEBG | test_utilization (SEC): saga log event
new_state = N037 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4305 | 2024-10-09T22:52:21.307Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0c49f2bd-68d2-42e0-94f6-9743edac67ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)})
node_id = 37
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4306 | 2024-10-09T22:52:21.310Z | DEBG | test_utilization (SEC): saga log event
new_state = N038 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4307 | 2024-10-09T22:52:21.310Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 38
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4308 | 2024-10-09T22:52:21.313Z | DEBG | test_utilization (SEC): saga log event
new_state = N038 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4309 | 2024-10-09T22:52:21.313Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 38
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4310 | 2024-10-09T22:52:21.317Z | DEBG | test_utilization (SEC): saga log event
new_state = N039 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4311 | 2024-10-09T22:52:21.317Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 39
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4312 | 2024-10-09T22:52:21.321Z | DEBG | test_utilization (SEC): saga log event
new_state = N039 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4313 | 2024-10-09T22:52:21.321Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 39
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4314 | 2024-10-09T22:52:21.327Z | DEBG | test_utilization (SEC): saga log event
new_state = N040 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4315 | 2024-10-09T22:52:21.327Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 40
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4316 | 2024-10-09T22:52:21.330Z | DEBG | test_utilization (SEC): saga log event
new_state = N040 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4317 | 2024-10-09T22:52:21.331Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 40
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4318 | 2024-10-09T22:52:21.334Z | DEBG | test_utilization (SEC): saga log event
new_state = N041 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4319 | 2024-10-09T22:52:21.334Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 41
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4320 | 2024-10-09T22:52:21.337Z | DEBG | test_utilization (SEC): saga log event
new_state = N041 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4321 | 2024-10-09T22:52:21.337Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f30a5e5d-d85e-4ed7-87c5-8ef9bf5d0263"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)})
node_id = 41
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4322 | 2024-10-09T22:52:21.341Z | DEBG | test_utilization (SEC): saga log event
new_state = N042 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4323 | 2024-10-09T22:52:21.341Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 42
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4324 | 2024-10-09T22:52:21.346Z | DEBG | test_utilization (SEC): saga log event
new_state = N042 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4325 | 2024-10-09T22:52:21.346Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 42
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4326 | 2024-10-09T22:52:21.349Z | DEBG | test_utilization (SEC): saga log event
new_state = N043 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4327 | 2024-10-09T22:52:21.349Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 43
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4328 | 2024-10-09T22:52:21.353Z | DEBG | test_utilization (SEC): saga log event
new_state = N043 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4329 | 2024-10-09T22:52:21.353Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 43
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4330 | 2024-10-09T22:52:21.357Z | DEBG | test_utilization (SEC): saga log event
new_state = N044 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4331 | 2024-10-09T22:52:21.357Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 44
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4332 | 2024-10-09T22:52:21.360Z | DEBG | test_utilization (SEC): saga log event
new_state = N044 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4333 | 2024-10-09T22:52:21.360Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 44
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4334 | 2024-10-09T22:52:21.365Z | DEBG | test_utilization (SEC): saga log event
new_state = N045 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4335 | 2024-10-09T22:52:21.365Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 45
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4336 | 2024-10-09T22:52:21.368Z | DEBG | test_utilization (SEC): saga log event
new_state = N045 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4337 | 2024-10-09T22:52:21.368Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("8d6ed561-c206-441c-82f0-2d2c8dfc2fff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)})
node_id = 45
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4338 | 2024-10-09T22:52:21.372Z | DEBG | test_utilization (SEC): saga log event
new_state = N046 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4339 | 2024-10-09T22:52:21.372Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 46
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4340 | 2024-10-09T22:52:21.376Z | DEBG | test_utilization (SEC): saga log event
new_state = N046 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4341 | 2024-10-09T22:52:21.376Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 46
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4342 | 2024-10-09T22:52:21.380Z | DEBG | test_utilization (SEC): saga log event
new_state = N047 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4343 | 2024-10-09T22:52:21.380Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 47
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4344 | 2024-10-09T22:52:21.383Z | DEBG | test_utilization (SEC): saga log event
new_state = N047 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4345 | 2024-10-09T22:52:21.383Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 47
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4346 | 2024-10-09T22:52:21.387Z | DEBG | test_utilization (SEC): saga log event
new_state = N048 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4347 | 2024-10-09T22:52:21.387Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 48
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4348 | 2024-10-09T22:52:21.390Z | DEBG | test_utilization (SEC): saga log event
new_state = N048 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4349 | 2024-10-09T22:52:21.390Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 48
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4350 | 2024-10-09T22:52:21.394Z | DEBG | test_utilization (SEC): saga log event
new_state = N049 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4351 | 2024-10-09T22:52:21.394Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 49
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4352 | 2024-10-09T22:52:21.398Z | DEBG | test_utilization (SEC): saga log event
new_state = N049 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4353 | 2024-10-09T22:52:21.398Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("6d6552f3-d0d7-4c33-aecb-61afacc69ea8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)})
node_id = 49
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4354 | 2024-10-09T22:52:21.404Z | DEBG | test_utilization (SEC): saga log event
new_state = N050 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4355 | 2024-10-09T22:52:21.405Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 50
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4356 | 2024-10-09T22:52:21.413Z | DEBG | test_utilization (SEC): saga log event
new_state = N050 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4357 | 2024-10-09T22:52:21.413Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 50
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4358 | 2024-10-09T22:52:21.419Z | DEBG | test_utilization (SEC): saga log event
new_state = N051 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4359 | 2024-10-09T22:52:21.419Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 51
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4360 | 2024-10-09T22:52:21.423Z | DEBG | test_utilization (SEC): saga log event
new_state = N051 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4361 | 2024-10-09T22:52:21.423Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 51
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4362 | 2024-10-09T22:52:21.427Z | DEBG | test_utilization (SEC): saga log event
new_state = N052 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4363 | 2024-10-09T22:52:21.427Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 52
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4364 | 2024-10-09T22:52:21.433Z | DEBG | test_utilization (SEC): saga log event
new_state = N052 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4365 | 2024-10-09T22:52:21.433Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 52
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4366 | 2024-10-09T22:52:21.464Z | DEBG | test_utilization (SEC): saga log event
new_state = N053 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4367 | 2024-10-09T22:52:21.464Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 53
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4368 | 2024-10-09T22:52:21.498Z | DEBG | test_utilization (SEC): saga log event
new_state = N053 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4369 | 2024-10-09T22:52:21.498Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9878641e-15e1-4420-ba2a-eff3f705c57a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)})
node_id = 53
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4370 | 2024-10-09T22:52:21.527Z | DEBG | test_utilization (SEC): saga log event
new_state = N054 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4371 | 2024-10-09T22:52:21.527Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 54
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4372 | 2024-10-09T22:52:21.530Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4373 | 2024-10-09T22:52:21.534Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4374 | 2024-10-09T22:52:21.534Z | DEBG | test_utilization (SEC): saga log event
new_state = N054 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4375 | 2024-10-09T22:52:21.535Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 54
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4376 | 2024-10-09T22:52:21.564Z | DEBG | test_utilization (SEC): saga log event
new_state = N055 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4377 | 2024-10-09T22:52:21.564Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 55
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4378 | 2024-10-09T22:52:21.572Z | DEBG | test_utilization (SEC): saga log event
new_state = N055 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4379 | 2024-10-09T22:52:21.573Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 55
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4380 | 2024-10-09T22:52:21.578Z | DEBG | test_utilization (SEC): saga log event
new_state = N056 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4381 | 2024-10-09T22:52:21.579Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 56
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4382 | 2024-10-09T22:52:21.582Z | DEBG | test_utilization (SEC): saga log event
new_state = N056 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4383 | 2024-10-09T22:52:21.582Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 56
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4384 | 2024-10-09T22:52:21.591Z | DEBG | test_utilization (SEC): saga log event
new_state = N057 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4385 | 2024-10-09T22:52:21.591Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 57
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4386 | 2024-10-09T22:52:21.597Z | DEBG | test_utilization (SEC): saga log event
new_state = N057 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4387 | 2024-10-09T22:52:21.597Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d040bc93-d17c-4802-bf66-cb4e70528fc7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)})
node_id = 57
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4388 | 2024-10-09T22:52:21.612Z | DEBG | test_utilization (SEC): saga log event
new_state = N058 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4389 | 2024-10-09T22:52:21.612Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 58
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4390 | 2024-10-09T22:52:21.617Z | DEBG | test_utilization (SEC): saga log event
new_state = N058 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4391 | 2024-10-09T22:52:21.617Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 58
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4392 | 2024-10-09T22:52:21.621Z | DEBG | test_utilization (SEC): saga log event
new_state = N059 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4393 | 2024-10-09T22:52:21.621Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 59
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4394 | 2024-10-09T22:52:21.625Z | DEBG | test_utilization (SEC): saga log event
new_state = N059 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4395 | 2024-10-09T22:52:21.625Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 59
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4396 | 2024-10-09T22:52:21.631Z | DEBG | test_utilization (SEC): saga log event
new_state = N060 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4397 | 2024-10-09T22:52:21.631Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 60
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4398 | 2024-10-09T22:52:21.634Z | DEBG | test_utilization (SEC): saga log event
new_state = N060 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4399 | 2024-10-09T22:52:21.634Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 60
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4400 | 2024-10-09T22:52:21.638Z | DEBG | test_utilization (SEC): saga log event
new_state = N061 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4401 | 2024-10-09T22:52:21.638Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 61
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4402 | 2024-10-09T22:52:21.642Z | DEBG | test_utilization (SEC): saga log event
new_state = N061 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4403 | 2024-10-09T22:52:21.644Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("09571873-401c-46d9-9a91-bce49f3adbff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)})
node_id = 61
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4404 | 2024-10-09T22:52:21.650Z | DEBG | test_utilization (SEC): saga log event
new_state = N062 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4405 | 2024-10-09T22:52:21.650Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 62
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4406 | 2024-10-09T22:52:21.654Z | DEBG | test_utilization (SEC): saga log event
new_state = N062 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4407 | 2024-10-09T22:52:21.654Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 62
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4408 | 2024-10-09T22:52:21.658Z | DEBG | test_utilization (SEC): saga log event
new_state = N063 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4409 | 2024-10-09T22:52:21.658Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 63
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4410 | 2024-10-09T22:52:21.669Z | DEBG | test_utilization (SEC): saga log event
new_state = N063 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4411 | 2024-10-09T22:52:21.669Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 63
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4412 | 2024-10-09T22:52:21.681Z | DEBG | test_utilization (SEC): saga log event
new_state = N064 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4413 | 2024-10-09T22:52:21.681Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 64
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4414 | 2024-10-09T22:52:21.723Z | DEBG | test_utilization (SEC): saga log event
new_state = N064 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4415 | 2024-10-09T22:52:21.723Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 64
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4416 | 2024-10-09T22:52:21.732Z | DEBG | test_utilization (SEC): saga log event
new_state = N065 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4417 | 2024-10-09T22:52:21.733Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 65
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4418 | 2024-10-09T22:52:21.756Z | DEBG | test_utilization (SEC): saga log event
new_state = N065 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4419 | 2024-10-09T22:52:21.756Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("13f38b8c-e7d5-43d9-b7ce-7ff1043b9479"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)})
node_id = 65
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4420 | 2024-10-09T22:52:21.774Z | DEBG | test_utilization (SEC): saga log event
new_state = N066 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4421 | 2024-10-09T22:52:21.774Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 66
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4422 | 2024-10-09T22:52:21.781Z | DEBG | test_utilization (SEC): saga log event
new_state = N066 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4423 | 2024-10-09T22:52:21.781Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 66
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4424 | 2024-10-09T22:52:21.797Z | DEBG | test_utilization (SEC): saga log event
new_state = N067 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4425 | 2024-10-09T22:52:21.798Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 67
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4426 | 2024-10-09T22:52:21.819Z | DEBG | test_utilization (SEC): saga log event
new_state = N067 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4427 | 2024-10-09T22:52:21.820Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 67
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4428 | 2024-10-09T22:52:21.851Z | DEBG | test_utilization (SEC): saga log event
new_state = N068 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4429 | 2024-10-09T22:52:21.851Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 68
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4430 | 2024-10-09T22:52:21.866Z | DEBG | test_utilization (SEC): saga log event
new_state = N068 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4431 | 2024-10-09T22:52:21.866Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 68
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4432 | 2024-10-09T22:52:21.881Z | DEBG | test_utilization (SEC): saga log event
new_state = N069 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4433 | 2024-10-09T22:52:21.881Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 69
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4434 | 2024-10-09T22:52:21.893Z | DEBG | test_utilization (SEC): saga log event
new_state = N069 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4435 | 2024-10-09T22:52:21.893Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("fa14058e-b426-43e4-8e72-1758f9627b6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)})
node_id = 69
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4436 | 2024-10-09T22:52:21.921Z | DEBG | test_utilization (SEC): saga log event
new_state = N070 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4437 | 2024-10-09T22:52:21.921Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 70
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4438 | 2024-10-09T22:52:21.930Z | DEBG | test_utilization (SEC): saga log event
new_state = N070 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4439 | 2024-10-09T22:52:21.930Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 70
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4440 | 2024-10-09T22:52:21.934Z | DEBG | test_utilization (SEC): saga log event
new_state = N071 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4441 | 2024-10-09T22:52:21.934Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 71
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4442 | 2024-10-09T22:52:21.946Z | DEBG | test_utilization (SEC): saga log event
new_state = N071 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4443 | 2024-10-09T22:52:21.946Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 71
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4444 | 2024-10-09T22:52:21.959Z | DEBG | test_utilization (SEC): saga log event
new_state = N072 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4445 | 2024-10-09T22:52:21.959Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 72
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4446 | 2024-10-09T22:52:21.969Z | DEBG | test_utilization (SEC): saga log event
new_state = N072 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4447 | 2024-10-09T22:52:21.969Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 72
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4448 | 2024-10-09T22:52:21.973Z | DEBG | test_utilization (SEC): saga log event
new_state = N073 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4449 | 2024-10-09T22:52:21.974Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 73
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4450 | 2024-10-09T22:52:21.980Z | DEBG | test_utilization (SEC): saga log event
new_state = N073 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4451 | 2024-10-09T22:52:21.980Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("dc21f576-55dd-4d00-a40b-9ab4656cdc19"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)})
node_id = 73
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4452 | 2024-10-09T22:52:21.984Z | DEBG | test_utilization (SEC): saga log event
new_state = N074 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4453 | 2024-10-09T22:52:21.984Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 74
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4454 | 2024-10-09T22:52:21.991Z | DEBG | test_utilization (SEC): saga log event
new_state = N074 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4455 | 2024-10-09T22:52:21.991Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 74
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4456 | 2024-10-09T22:52:21.996Z | DEBG | test_utilization (SEC): saga log event
new_state = N075 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4457 | 2024-10-09T22:52:21.996Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 75
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4458 | 2024-10-09T22:52:22.002Z | DEBG | test_utilization (SEC): saga log event
new_state = N075 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4459 | 2024-10-09T22:52:22.002Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 75
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4460 | 2024-10-09T22:52:22.008Z | DEBG | test_utilization (SEC): saga log event
new_state = N076 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4461 | 2024-10-09T22:52:22.008Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 76
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4462 | 2024-10-09T22:52:22.014Z | DEBG | test_utilization (SEC): saga log event
new_state = N076 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4463 | 2024-10-09T22:52:22.015Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 76
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4464 | 2024-10-09T22:52:22.020Z | DEBG | test_utilization (SEC): saga log event
new_state = N077 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4465 | 2024-10-09T22:52:22.025Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 77
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4466 | 2024-10-09T22:52:22.036Z | DEBG | test_utilization (SEC): saga log event
new_state = N077 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4467 | 2024-10-09T22:52:22.036Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("62be35ee-9cb1-48dd-88ab-1904ee3b78b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)})
node_id = 77
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4468 | 2024-10-09T22:52:22.060Z | DEBG | test_utilization (SEC): saga log event
new_state = N078 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4469 | 2024-10-09T22:52:22.060Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 78
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4470 | 2024-10-09T22:52:22.070Z | DEBG | test_utilization (SEC): saga log event
new_state = N078 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4471 | 2024-10-09T22:52:22.070Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 78
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4472 | 2024-10-09T22:52:22.090Z | DEBG | test_utilization (SEC): saga log event
new_state = N079 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4473 | 2024-10-09T22:52:22.090Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 79
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4474 | 2024-10-09T22:52:22.107Z | DEBG | test_utilization (SEC): saga log event
new_state = N079 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4475 | 2024-10-09T22:52:22.107Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 79
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4476 | 2024-10-09T22:52:22.120Z | DEBG | test_utilization (SEC): saga log event
new_state = N080 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4477 | 2024-10-09T22:52:22.120Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 80
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4478 | 2024-10-09T22:52:22.121Z | DEBG | test_utilization (SEC): saga log event
new_state = N080 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4479 | 2024-10-09T22:52:22.121Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 80
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4480 | 2024-10-09T22:52:22.127Z | DEBG | test_utilization (SEC): saga log event
new_state = N081 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4481 | 2024-10-09T22:52:22.128Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 81
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4482 | 2024-10-09T22:52:22.132Z | DEBG | test_utilization (SEC): saga log event
new_state = N081 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4483 | 2024-10-09T22:52:22.132Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2b7bf2a6-efe3-4e9a-b2b0-16d1aafb06cc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)})
node_id = 81
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4484 | 2024-10-09T22:52:22.148Z | DEBG | test_utilization (SEC): saga log event
new_state = N082 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4485 | 2024-10-09T22:52:22.148Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 82
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4486 | 2024-10-09T22:52:22.151Z | DEBG | test_utilization (SEC): saga log event
new_state = N082 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4487 | 2024-10-09T22:52:22.152Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 82
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4488 | 2024-10-09T22:52:22.161Z | DEBG | test_utilization (SEC): saga log event
new_state = N083 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4489 | 2024-10-09T22:52:22.161Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 83
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4490 | 2024-10-09T22:52:22.166Z | DEBG | test_utilization (SEC): saga log event
new_state = N083 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4491 | 2024-10-09T22:52:22.166Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 83
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4492 | 2024-10-09T22:52:22.182Z | DEBG | test_utilization (SEC): saga log event
new_state = N084 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4493 | 2024-10-09T22:52:22.182Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 84
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4494 | 2024-10-09T22:52:22.189Z | DEBG | test_utilization (SEC): saga log event
new_state = N084 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4495 | 2024-10-09T22:52:22.189Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 84
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4496 | 2024-10-09T22:52:22.192Z | DEBG | test_utilization (SEC): saga log event
new_state = N085 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4497 | 2024-10-09T22:52:22.192Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 85
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4498 | 2024-10-09T22:52:22.198Z | DEBG | test_utilization (SEC): saga log event
new_state = N085 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4499 | 2024-10-09T22:52:22.198Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3fe8375b-3d13-4e0b-ab2a-e9ee66894203"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)})
node_id = 85
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4500 | 2024-10-09T22:52:22.201Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4501 | 2024-10-09T22:52:22.201Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
4502 | 2024-10-09T22:52:22.203Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
4503 | 2024-10-09T22:52:22.204Z | DEBG | test_utilization (SEC): saga log event
new_state = N086 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4504 | 2024-10-09T22:52:22.204Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 86
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4505 | 2024-10-09T22:52:22.207Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
4506 | 2024-10-09T22:52:22.207Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:21.532220368","datum":2}\n
|
4507 | 2024-10-09T22:52:22.210Z | DEBG | test_utilization (SEC): saga log event
new_state = N086 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4508 | 2024-10-09T22:52:22.210Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 86
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4509 | 2024-10-09T22:52:22.211Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
4510 | 2024-10-09T22:52:22.211Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4511 | 2024-10-09T22:52:22.214Z | DEBG | test_utilization (SEC): saga log event
new_state = N087 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4512 | 2024-10-09T22:52:22.214Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 87
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4513 | 2024-10-09T22:52:22.231Z | DEBG | test_utilization (SEC): saga log event
new_state = N087 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4514 | 2024-10-09T22:52:22.231Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 87
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4515 | 2024-10-09T22:52:22.237Z | DEBG | test_utilization (SEC): saga log event
new_state = N088 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4516 | 2024-10-09T22:52:22.237Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 88
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4517 | 2024-10-09T22:52:22.247Z | DEBG | test_utilization (SEC): saga log event
new_state = N088 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4518 | 2024-10-09T22:52:22.247Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 88
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4519 | 2024-10-09T22:52:22.264Z | DEBG | test_utilization (SEC): saga log event
new_state = N089 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4520 | 2024-10-09T22:52:22.264Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 89
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4521 | 2024-10-09T22:52:22.269Z | DEBG | test_utilization (SEC): saga log event
new_state = N089 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4522 | 2024-10-09T22:52:22.269Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c4cec854-dcf2-4b85-9e97-1895fe75ad58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)})
node_id = 89
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4523 | 2024-10-09T22:52:22.287Z | DEBG | test_utilization (SEC): saga log event
new_state = N090 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4524 | 2024-10-09T22:52:22.287Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 90
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4525 | 2024-10-09T22:52:22.300Z | DEBG | test_utilization (SEC): saga log event
new_state = N090 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4526 | 2024-10-09T22:52:22.300Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 90
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4527 | 2024-10-09T22:52:22.313Z | DEBG | test_utilization (SEC): saga log event
new_state = N091 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4528 | 2024-10-09T22:52:22.313Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 91
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4529 | 2024-10-09T22:52:22.323Z | DEBG | test_utilization (SEC): saga log event
new_state = N091 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4530 | 2024-10-09T22:52:22.323Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 91
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4531 | 2024-10-09T22:52:22.349Z | DEBG | test_utilization (SEC): saga log event
new_state = N092 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4532 | 2024-10-09T22:52:22.349Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 92
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4533 | 2024-10-09T22:52:22.361Z | DEBG | test_utilization (SEC): saga log event
new_state = N092 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4534 | 2024-10-09T22:52:22.361Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 92
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4535 | 2024-10-09T22:52:22.365Z | DEBG | test_utilization (SEC): saga log event
new_state = N093 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4536 | 2024-10-09T22:52:22.365Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 93
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4537 | 2024-10-09T22:52:22.371Z | DEBG | test_utilization (SEC): saga log event
new_state = N093 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4538 | 2024-10-09T22:52:22.372Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("e8db60e5-2693-4c37-a450-e56ff87c50e2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)})
node_id = 93
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4539 | 2024-10-09T22:52:22.377Z | DEBG | test_utilization (SEC): saga log event
new_state = N094 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4540 | 2024-10-09T22:52:22.377Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 94
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4541 | 2024-10-09T22:52:22.381Z | DEBG | test_utilization (SEC): saga log event
new_state = N094 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4542 | 2024-10-09T22:52:22.381Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 94
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4543 | 2024-10-09T22:52:22.386Z | DEBG | test_utilization (SEC): saga log event
new_state = N095 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4544 | 2024-10-09T22:52:22.387Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 95
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4545 | 2024-10-09T22:52:22.390Z | DEBG | test_utilization (SEC): saga log event
new_state = N095 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4546 | 2024-10-09T22:52:22.390Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 95
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4547 | 2024-10-09T22:52:22.394Z | DEBG | test_utilization (SEC): saga log event
new_state = N096 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4548 | 2024-10-09T22:52:22.394Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 96
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4549 | 2024-10-09T22:52:22.397Z | DEBG | test_utilization (SEC): saga log event
new_state = N096 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4550 | 2024-10-09T22:52:22.397Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 96
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4551 | 2024-10-09T22:52:22.401Z | DEBG | test_utilization (SEC): saga log event
new_state = N097 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4552 | 2024-10-09T22:52:22.401Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 97
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4553 | 2024-10-09T22:52:22.404Z | DEBG | test_utilization (SEC): saga log event
new_state = N097 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4554 | 2024-10-09T22:52:22.404Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2c393be5-8ca0-451d-a2bf-5a33f17df3c0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)})
node_id = 97
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4555 | 2024-10-09T22:52:22.420Z | DEBG | test_utilization (SEC): saga log event
new_state = N098 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4556 | 2024-10-09T22:52:22.420Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 98
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4557 | 2024-10-09T22:52:22.428Z | DEBG | test_utilization (SEC): saga log event
new_state = N098 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4558 | 2024-10-09T22:52:22.428Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 98
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4559 | 2024-10-09T22:52:22.432Z | DEBG | test_utilization (SEC): saga log event
new_state = N099 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4560 | 2024-10-09T22:52:22.432Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 99
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4561 | 2024-10-09T22:52:22.439Z | DEBG | test_utilization (SEC): saga log event
new_state = N099 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4562 | 2024-10-09T22:52:22.439Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 99
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4563 | 2024-10-09T22:52:22.443Z | DEBG | test_utilization (SEC): saga log event
new_state = N100 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4564 | 2024-10-09T22:52:22.443Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 100
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4565 | 2024-10-09T22:52:22.447Z | DEBG | test_utilization (SEC): saga log event
new_state = N100 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4566 | 2024-10-09T22:52:22.447Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 100
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4567 | 2024-10-09T22:52:22.452Z | DEBG | test_utilization (SEC): saga log event
new_state = N101 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4568 | 2024-10-09T22:52:22.452Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 101
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4569 | 2024-10-09T22:52:22.456Z | DEBG | test_utilization (SEC): saga log event
new_state = N101 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4570 | 2024-10-09T22:52:22.456Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9d9c1904-8189-45a6-be5b-1b6aa8bd4b51"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)})
node_id = 101
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4571 | 2024-10-09T22:52:22.460Z | DEBG | test_utilization (SEC): saga log event
new_state = N102 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4572 | 2024-10-09T22:52:22.461Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 102
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4573 | 2024-10-09T22:52:22.464Z | DEBG | test_utilization (SEC): saga log event
new_state = N102 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4574 | 2024-10-09T22:52:22.464Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 102
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4575 | 2024-10-09T22:52:22.468Z | DEBG | test_utilization (SEC): saga log event
new_state = N103 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4576 | 2024-10-09T22:52:22.468Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 103
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4577 | 2024-10-09T22:52:22.472Z | DEBG | test_utilization (SEC): saga log event
new_state = N103 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4578 | 2024-10-09T22:52:22.474Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 103
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4579 | 2024-10-09T22:52:22.483Z | DEBG | test_utilization (SEC): saga log event
new_state = N104 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4580 | 2024-10-09T22:52:22.483Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 104
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4581 | 2024-10-09T22:52:22.491Z | DEBG | test_utilization (SEC): saga log event
new_state = N104 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4582 | 2024-10-09T22:52:22.491Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 104
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4583 | 2024-10-09T22:52:22.496Z | DEBG | test_utilization (SEC): saga log event
new_state = N105 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4584 | 2024-10-09T22:52:22.496Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 105
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4585 | 2024-10-09T22:52:22.500Z | DEBG | test_utilization (SEC): saga log event
new_state = N105 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4586 | 2024-10-09T22:52:22.501Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("aff35c8c-f729-41e6-9769-be86fed938ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)})
node_id = 105
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4587 | 2024-10-09T22:52:22.507Z | DEBG | test_utilization (SEC): saga log event
new_state = N106 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4588 | 2024-10-09T22:52:22.507Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 106
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4589 | 2024-10-09T22:52:22.513Z | DEBG | test_utilization (SEC): saga log event
new_state = N106 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4590 | 2024-10-09T22:52:22.513Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 106
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4591 | 2024-10-09T22:52:22.518Z | DEBG | test_utilization (SEC): saga log event
new_state = N107 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4592 | 2024-10-09T22:52:22.518Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 107
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4593 | 2024-10-09T22:52:22.524Z | DEBG | test_utilization (SEC): saga log event
new_state = N107 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4594 | 2024-10-09T22:52:22.524Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 107
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4595 | 2024-10-09T22:52:22.526Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4596 | 2024-10-09T22:52:22.529Z | DEBG | test_utilization (SEC): saga log event
new_state = N108 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4597 | 2024-10-09T22:52:22.529Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 108
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4598 | 2024-10-09T22:52:22.530Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4599 | 2024-10-09T22:52:22.534Z | DEBG | test_utilization (SEC): saga log event
new_state = N108 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4600 | 2024-10-09T22:52:22.534Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 108
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4601 | 2024-10-09T22:52:22.539Z | DEBG | test_utilization (SEC): saga log event
new_state = N109 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4602 | 2024-10-09T22:52:22.540Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 109
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4603 | 2024-10-09T22:52:22.556Z | DEBG | test_utilization (SEC): saga log event
new_state = N109 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4604 | 2024-10-09T22:52:22.556Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f5826e28-7b49-4da1-bbf6-1858a7021d65"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)})
node_id = 109
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4605 | 2024-10-09T22:52:22.563Z | DEBG | test_utilization (SEC): saga log event
new_state = N110 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4606 | 2024-10-09T22:52:22.563Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 110
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4607 | 2024-10-09T22:52:22.567Z | DEBG | test_utilization (SEC): saga log event
new_state = N110 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4608 | 2024-10-09T22:52:22.567Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 110
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4609 | 2024-10-09T22:52:22.571Z | DEBG | test_utilization (SEC): saga log event
new_state = N111 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4610 | 2024-10-09T22:52:22.571Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 111
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4611 | 2024-10-09T22:52:22.585Z | DEBG | test_utilization (SEC): saga log event
new_state = N111 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4612 | 2024-10-09T22:52:22.586Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 111
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4613 | 2024-10-09T22:52:22.590Z | DEBG | test_utilization (SEC): saga log event
new_state = N112 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4614 | 2024-10-09T22:52:22.590Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 112
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4615 | 2024-10-09T22:52:22.595Z | DEBG | test_utilization (SEC): saga log event
new_state = N112 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4616 | 2024-10-09T22:52:22.595Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 112
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4617 | 2024-10-09T22:52:22.604Z | DEBG | test_utilization (SEC): saga log event
new_state = N113 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4618 | 2024-10-09T22:52:22.604Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 113
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4619 | 2024-10-09T22:52:22.610Z | DEBG | test_utilization (SEC): saga log event
new_state = N113 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4620 | 2024-10-09T22:52:22.610Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bd36d4d-c0cc-4cb8-84d6-1a0612246629"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)})
node_id = 113
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4621 | 2024-10-09T22:52:22.614Z | DEBG | test_utilization (SEC): saga log event
new_state = N114 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4622 | 2024-10-09T22:52:22.615Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 114
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4623 | 2024-10-09T22:52:22.621Z | DEBG | test_utilization (SEC): saga log event
new_state = N114 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4624 | 2024-10-09T22:52:22.621Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 114
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4625 | 2024-10-09T22:52:22.625Z | DEBG | test_utilization (SEC): saga log event
new_state = N115 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4626 | 2024-10-09T22:52:22.625Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 115
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4627 | 2024-10-09T22:52:22.655Z | DEBG | test_utilization (SEC): saga log event
new_state = N115 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4628 | 2024-10-09T22:52:22.655Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 115
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4629 | 2024-10-09T22:52:22.660Z | DEBG | test_utilization (SEC): saga log event
new_state = N116 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4630 | 2024-10-09T22:52:22.661Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 116
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4631 | 2024-10-09T22:52:22.664Z | DEBG | test_utilization (SEC): saga log event
new_state = N116 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4632 | 2024-10-09T22:52:22.664Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 116
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4633 | 2024-10-09T22:52:22.669Z | DEBG | test_utilization (SEC): saga log event
new_state = N117 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4634 | 2024-10-09T22:52:22.669Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 117
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4635 | 2024-10-09T22:52:22.673Z | DEBG | test_utilization (SEC): saga log event
new_state = N117 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4636 | 2024-10-09T22:52:22.673Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("968fe93f-ca8e-4ca1-8e02-51d6b1e39164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)})
node_id = 117
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4637 | 2024-10-09T22:52:22.677Z | DEBG | test_utilization (SEC): saga log event
new_state = N118 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4638 | 2024-10-09T22:52:22.679Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 118
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4639 | 2024-10-09T22:52:22.688Z | DEBG | test_utilization (SEC): saga log event
new_state = N118 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4640 | 2024-10-09T22:52:22.688Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 118
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4641 | 2024-10-09T22:52:22.691Z | DEBG | test_utilization (SEC): saga log event
new_state = N119 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4642 | 2024-10-09T22:52:22.691Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 119
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4643 | 2024-10-09T22:52:22.695Z | DEBG | test_utilization (SEC): saga log event
new_state = N119 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4644 | 2024-10-09T22:52:22.695Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 119
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4645 | 2024-10-09T22:52:22.699Z | DEBG | test_utilization (SEC): saga log event
new_state = N120 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4646 | 2024-10-09T22:52:22.699Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 120
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4647 | 2024-10-09T22:52:22.703Z | DEBG | test_utilization (SEC): saga log event
new_state = N120 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4648 | 2024-10-09T22:52:22.703Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 120
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4649 | 2024-10-09T22:52:22.707Z | DEBG | test_utilization (SEC): saga log event
new_state = N121 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4650 | 2024-10-09T22:52:22.707Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 121
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4651 | 2024-10-09T22:52:22.710Z | DEBG | test_utilization (SEC): saga log event
new_state = N121 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4652 | 2024-10-09T22:52:22.710Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("daed1120-f7c9-4a78-aa8a-4ba5ed21f149"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)})
node_id = 121
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4653 | 2024-10-09T22:52:22.714Z | DEBG | test_utilization (SEC): saga log event
new_state = N122 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4654 | 2024-10-09T22:52:22.714Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 122
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4655 | 2024-10-09T22:52:22.717Z | DEBG | test_utilization (SEC): saga log event
new_state = N122 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4656 | 2024-10-09T22:52:22.718Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 122
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4657 | 2024-10-09T22:52:22.721Z | DEBG | test_utilization (SEC): saga log event
new_state = N123 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4658 | 2024-10-09T22:52:22.721Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 123
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4659 | 2024-10-09T22:52:22.725Z | DEBG | test_utilization (SEC): saga log event
new_state = N123 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4660 | 2024-10-09T22:52:22.725Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 123
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4661 | 2024-10-09T22:52:22.733Z | DEBG | test_utilization (SEC): saga log event
new_state = N124 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4662 | 2024-10-09T22:52:22.733Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 124
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4663 | 2024-10-09T22:52:22.742Z | DEBG | test_utilization (SEC): saga log event
new_state = N124 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4664 | 2024-10-09T22:52:22.742Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 124
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4665 | 2024-10-09T22:52:22.748Z | DEBG | test_utilization (SEC): saga log event
new_state = N125 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4666 | 2024-10-09T22:52:22.749Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 125
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4667 | 2024-10-09T22:52:22.761Z | DEBG | test_utilization (SEC): saga log event
new_state = N125 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4668 | 2024-10-09T22:52:22.761Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("536265c9-d618-4a38-b788-bf0f584062d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)})
node_id = 125
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4669 | 2024-10-09T22:52:22.766Z | DEBG | test_utilization (SEC): saga log event
new_state = N126 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4670 | 2024-10-09T22:52:22.766Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 126
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4671 | 2024-10-09T22:52:22.777Z | DEBG | test_utilization (SEC): saga log event
new_state = N126 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4672 | 2024-10-09T22:52:22.777Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 126
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4673 | 2024-10-09T22:52:22.781Z | DEBG | test_utilization (SEC): saga log event
new_state = N127 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4674 | 2024-10-09T22:52:22.781Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 127
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4675 | 2024-10-09T22:52:22.785Z | DEBG | test_utilization (SEC): saga log event
new_state = N127 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4676 | 2024-10-09T22:52:22.785Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 127
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4677 | 2024-10-09T22:52:22.789Z | DEBG | test_utilization (SEC): saga log event
new_state = N128 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4678 | 2024-10-09T22:52:22.789Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 128
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4679 | 2024-10-09T22:52:22.792Z | DEBG | test_utilization (SEC): saga log event
new_state = N128 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4680 | 2024-10-09T22:52:22.792Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 128
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4681 | 2024-10-09T22:52:22.797Z | DEBG | test_utilization (SEC): saga log event
new_state = N129 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4682 | 2024-10-09T22:52:22.797Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 129
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4683 | 2024-10-09T22:52:22.801Z | DEBG | test_utilization (SEC): saga log event
new_state = N129 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4684 | 2024-10-09T22:52:22.801Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c603bed4-18d9-4250-965c-647ba194fa88"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)})
node_id = 129
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4685 | 2024-10-09T22:52:22.804Z | DEBG | test_utilization (SEC): saga log event
new_state = N130 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4686 | 2024-10-09T22:52:22.805Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 130
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4687 | 2024-10-09T22:52:22.818Z | DEBG | test_utilization (SEC): saga log event
new_state = N130 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4688 | 2024-10-09T22:52:22.818Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 130
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4689 | 2024-10-09T22:52:22.863Z | DEBG | test_utilization (SEC): saga log event
new_state = N131 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4690 | 2024-10-09T22:52:22.863Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 131
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4691 | 2024-10-09T22:52:22.901Z | DEBG | test_utilization (SEC): saga log event
new_state = N131 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4692 | 2024-10-09T22:52:22.902Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 131
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4693 | 2024-10-09T22:52:22.906Z | DEBG | test_utilization (SEC): saga log event
new_state = N132 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4694 | 2024-10-09T22:52:22.906Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 132
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4695 | 2024-10-09T22:52:22.915Z | DEBG | test_utilization (SEC): saga log event
new_state = N132 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4696 | 2024-10-09T22:52:22.916Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 132
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4697 | 2024-10-09T22:52:22.940Z | DEBG | test_utilization (SEC): saga log event
new_state = N133 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4698 | 2024-10-09T22:52:22.940Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 133
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4699 | 2024-10-09T22:52:22.968Z | DEBG | test_utilization (SEC): saga log event
new_state = N133 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4700 | 2024-10-09T22:52:22.968Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("07605532-9e8c-49d7-8b16-0e39754c9d90"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)})
node_id = 133
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4701 | 2024-10-09T22:52:22.983Z | DEBG | test_utilization (SEC): saga log event
new_state = N134 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4702 | 2024-10-09T22:52:22.983Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 134
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4703 | 2024-10-09T22:52:22.989Z | DEBG | test_utilization (SEC): saga log event
new_state = N134 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4704 | 2024-10-09T22:52:22.990Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 134
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4705 | 2024-10-09T22:52:23.005Z | DEBG | test_utilization (SEC): saga log event
new_state = N135 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4706 | 2024-10-09T22:52:23.008Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 135
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4707 | 2024-10-09T22:52:23.010Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
4708 | 2024-10-09T22:52:23.012Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 3.32180992s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
4709 | 2024-10-09T22:52:23.013Z | DEBG | test_utilization (SEC): saga log event
new_state = N135 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4710 | 2024-10-09T22:52:23.013Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 135
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4711 | 2024-10-09T22:52:23.030Z | DEBG | test_utilization (SEC): saga log event
new_state = N136 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4712 | 2024-10-09T22:52:23.049Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 136
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4713 | 2024-10-09T22:52:23.071Z | DEBG | test_utilization (SEC): saga log event
new_state = N136 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4714 | 2024-10-09T22:52:23.071Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 136
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4715 | 2024-10-09T22:52:23.088Z | DEBG | test_utilization (SEC): saga log event
new_state = N137 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4716 | 2024-10-09T22:52:23.093Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 137
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4717 | 2024-10-09T22:52:23.126Z | DEBG | test_utilization (SEC): saga log event
new_state = N137 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4718 | 2024-10-09T22:52:23.126Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("670083fb-8463-4124-8467-503e2a6bf33c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)})
node_id = 137
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4719 | 2024-10-09T22:52:23.141Z | DEBG | test_utilization (SEC): saga log event
new_state = N138 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4720 | 2024-10-09T22:52:23.141Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 138
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4721 | 2024-10-09T22:52:23.155Z | DEBG | test_utilization (SEC): saga log event
new_state = N138 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4722 | 2024-10-09T22:52:23.155Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 138
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4723 | 2024-10-09T22:52:23.197Z | DEBG | test_utilization (SEC): saga log event
new_state = N139 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4724 | 2024-10-09T22:52:23.197Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 139
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4725 | 2024-10-09T22:52:23.201Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4726 | 2024-10-09T22:52:23.201Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
4727 | 2024-10-09T22:52:23.202Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
4728 | 2024-10-09T22:52:23.209Z | DEBG | test_utilization (SEC): saga log event
new_state = N139 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4729 | 2024-10-09T22:52:23.209Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 139
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4730 | 2024-10-09T22:52:23.210Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
4731 | 2024-10-09T22:52:23.210Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:22.527058307","datum":3}\n
|
4732 | 2024-10-09T22:52:23.214Z | DEBG | test_utilization (SEC): saga log event
new_state = N140 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4733 | 2024-10-09T22:52:23.220Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 140
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4734 | 2024-10-09T22:52:23.221Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
4735 | 2024-10-09T22:52:23.221Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4736 | 2024-10-09T22:52:23.225Z | DEBG | test_utilization (SEC): saga log event
new_state = N140 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4737 | 2024-10-09T22:52:23.225Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 140
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4738 | 2024-10-09T22:52:23.234Z | DEBG | test_utilization (SEC): saga log event
new_state = N141 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4739 | 2024-10-09T22:52:23.234Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 141
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4740 | 2024-10-09T22:52:23.264Z | DEBG | test_utilization (SEC): saga log event
new_state = N141 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4741 | 2024-10-09T22:52:23.264Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bb3ea71-bb81-427f-8922-ece08c84881b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)})
node_id = 141
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4742 | 2024-10-09T22:52:23.277Z | DEBG | test_utilization (SEC): saga log event
new_state = N142 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4743 | 2024-10-09T22:52:23.277Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 142
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4744 | 2024-10-09T22:52:23.303Z | DEBG | test_utilization (SEC): saga log event
new_state = N142 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4745 | 2024-10-09T22:52:23.303Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 142
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4746 | 2024-10-09T22:52:23.312Z | DEBG | test_utilization (SEC): saga log event
new_state = N143 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4747 | 2024-10-09T22:52:23.313Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 143
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4748 | 2024-10-09T22:52:23.324Z | DEBG | test_utilization (SEC): saga log event
new_state = N143 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4749 | 2024-10-09T22:52:23.324Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 143
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4750 | 2024-10-09T22:52:23.331Z | DEBG | test_utilization (SEC): saga log event
new_state = N144 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4751 | 2024-10-09T22:52:23.332Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 144
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4752 | 2024-10-09T22:52:23.336Z | DEBG | test_utilization (SEC): saga log event
new_state = N144 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4753 | 2024-10-09T22:52:23.336Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 144
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4754 | 2024-10-09T22:52:23.347Z | DEBG | test_utilization (SEC): saga log event
new_state = N145 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4755 | 2024-10-09T22:52:23.347Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 145
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4756 | 2024-10-09T22:52:23.351Z | DEBG | test_utilization (SEC): saga log event
new_state = N145 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4757 | 2024-10-09T22:52:23.351Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("69003053-edcf-48c1-bbb3-fa0c0db287cd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)})
node_id = 145
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4758 | 2024-10-09T22:52:23.355Z | DEBG | test_utilization (SEC): saga log event
new_state = N146 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4759 | 2024-10-09T22:52:23.355Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 146
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4760 | 2024-10-09T22:52:23.359Z | DEBG | test_utilization (SEC): saga log event
new_state = N146 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4761 | 2024-10-09T22:52:23.359Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 146
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4762 | 2024-10-09T22:52:23.363Z | DEBG | test_utilization (SEC): saga log event
new_state = N147 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4763 | 2024-10-09T22:52:23.363Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 147
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4764 | 2024-10-09T22:52:23.366Z | DEBG | test_utilization (SEC): saga log event
new_state = N147 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4765 | 2024-10-09T22:52:23.366Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 147
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4766 | 2024-10-09T22:52:23.374Z | DEBG | test_utilization (SEC): saga log event
new_state = N148 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4767 | 2024-10-09T22:52:23.374Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 148
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4768 | 2024-10-09T22:52:23.379Z | DEBG | test_utilization (SEC): saga log event
new_state = N148 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4769 | 2024-10-09T22:52:23.379Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 148
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4770 | 2024-10-09T22:52:23.383Z | DEBG | test_utilization (SEC): saga log event
new_state = N149 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4771 | 2024-10-09T22:52:23.383Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 149
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4772 | 2024-10-09T22:52:23.387Z | DEBG | test_utilization (SEC): saga log event
new_state = N149 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4773 | 2024-10-09T22:52:23.387Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7b5a1476-4e3b-4099-9ffc-7dfb44a7c251"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)})
node_id = 149
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4774 | 2024-10-09T22:52:23.391Z | DEBG | test_utilization (SEC): saga log event
new_state = N150 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4775 | 2024-10-09T22:52:23.391Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 150
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4776 | 2024-10-09T22:52:23.395Z | DEBG | test_utilization (SEC): saga log event
new_state = N150 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4777 | 2024-10-09T22:52:23.395Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 150
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4778 | 2024-10-09T22:52:23.399Z | DEBG | test_utilization (SEC): saga log event
new_state = N151 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4779 | 2024-10-09T22:52:23.399Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 151
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4780 | 2024-10-09T22:52:23.404Z | DEBG | test_utilization (SEC): saga log event
new_state = N151 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4781 | 2024-10-09T22:52:23.404Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 151
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4782 | 2024-10-09T22:52:23.412Z | DEBG | test_utilization (SEC): saga log event
new_state = N152 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4783 | 2024-10-09T22:52:23.412Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 152
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4784 | 2024-10-09T22:52:23.416Z | DEBG | test_utilization (SEC): saga log event
new_state = N152 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4785 | 2024-10-09T22:52:23.416Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 152
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4786 | 2024-10-09T22:52:23.420Z | DEBG | test_utilization (SEC): saga log event
new_state = N153 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4787 | 2024-10-09T22:52:23.420Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 153
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4788 | 2024-10-09T22:52:23.425Z | DEBG | test_utilization (SEC): saga log event
new_state = N153 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4789 | 2024-10-09T22:52:23.425Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f255b540-23e4-41f1-bd84-d6e7c30c7cb9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)})
node_id = 153
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4790 | 2024-10-09T22:52:23.431Z | DEBG | test_utilization (SEC): saga log event
new_state = N154 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4791 | 2024-10-09T22:52:23.431Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 154
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4792 | 2024-10-09T22:52:23.435Z | DEBG | test_utilization (SEC): saga log event
new_state = N154 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4793 | 2024-10-09T22:52:23.435Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 154
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4794 | 2024-10-09T22:52:23.439Z | DEBG | test_utilization (SEC): saga log event
new_state = N155 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4795 | 2024-10-09T22:52:23.439Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 155
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4796 | 2024-10-09T22:52:23.444Z | DEBG | test_utilization (SEC): saga log event
new_state = N155 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4797 | 2024-10-09T22:52:23.444Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 155
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4798 | 2024-10-09T22:52:23.448Z | DEBG | test_utilization (SEC): saga log event
new_state = N156 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4799 | 2024-10-09T22:52:23.448Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 156
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4800 | 2024-10-09T22:52:23.452Z | DEBG | test_utilization (SEC): saga log event
new_state = N156 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4801 | 2024-10-09T22:52:23.452Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 156
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4802 | 2024-10-09T22:52:23.456Z | DEBG | test_utilization (SEC): saga log event
new_state = N157 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4803 | 2024-10-09T22:52:23.456Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 157
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4804 | 2024-10-09T22:52:23.459Z | DEBG | test_utilization (SEC): saga log event
new_state = N157 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4805 | 2024-10-09T22:52:23.459Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("1eb7874f-a60d-45aa-98eb-c4b9bf41b172"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)})
node_id = 157
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4806 | 2024-10-09T22:52:23.463Z | DEBG | test_utilization (SEC): saga log event
new_state = N158 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4807 | 2024-10-09T22:52:23.463Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 158
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4808 | 2024-10-09T22:52:23.467Z | DEBG | test_utilization (SEC): saga log event
new_state = N158 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4809 | 2024-10-09T22:52:23.467Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 158
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4810 | 2024-10-09T22:52:23.473Z | DEBG | test_utilization (SEC): saga log event
new_state = N159 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4811 | 2024-10-09T22:52:23.473Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 159
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4812 | 2024-10-09T22:52:23.481Z | DEBG | test_utilization (SEC): saga log event
new_state = N159 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4813 | 2024-10-09T22:52:23.481Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 159
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4814 | 2024-10-09T22:52:23.486Z | DEBG | test_utilization (SEC): saga log event
new_state = N160 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4815 | 2024-10-09T22:52:23.487Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 160
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4816 | 2024-10-09T22:52:23.492Z | DEBG | test_utilization (SEC): saga log event
new_state = N160 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4817 | 2024-10-09T22:52:23.492Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 160
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4818 | 2024-10-09T22:52:23.498Z | DEBG | test_utilization (SEC): saga log event
new_state = N161 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4819 | 2024-10-09T22:52:23.498Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 161
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4820 | 2024-10-09T22:52:23.502Z | DEBG | test_utilization (SEC): saga log event
new_state = N161 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4821 | 2024-10-09T22:52:23.502Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("641c62fc-11ca-4510-825d-80c592678fca"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)})
node_id = 161
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4822 | 2024-10-09T22:52:23.511Z | DEBG | test_utilization (SEC): saga log event
new_state = N162 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4823 | 2024-10-09T22:52:23.511Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 162
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4824 | 2024-10-09T22:52:23.521Z | DEBG | test_utilization (SEC): saga log event
new_state = N162 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4825 | 2024-10-09T22:52:23.522Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 162
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4826 | 2024-10-09T22:52:23.526Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4827 | 2024-10-09T22:52:23.527Z | DEBG | test_utilization (SEC): saga log event
new_state = N163 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4828 | 2024-10-09T22:52:23.527Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 163
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4829 | 2024-10-09T22:52:23.530Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4830 | 2024-10-09T22:52:23.534Z | DEBG | test_utilization (SEC): saga log event
new_state = N163 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4831 | 2024-10-09T22:52:23.534Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 163
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4832 | 2024-10-09T22:52:23.540Z | DEBG | test_utilization (SEC): saga log event
new_state = N164 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4833 | 2024-10-09T22:52:23.540Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 164
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4834 | 2024-10-09T22:52:23.545Z | DEBG | test_utilization (SEC): saga log event
new_state = N164 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4835 | 2024-10-09T22:52:23.545Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 164
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4836 | 2024-10-09T22:52:23.554Z | DEBG | test_utilization (SEC): saga log event
new_state = N165 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4837 | 2024-10-09T22:52:23.554Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 165
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4838 | 2024-10-09T22:52:23.558Z | DEBG | test_utilization (SEC): saga log event
new_state = N165 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4839 | 2024-10-09T22:52:23.558Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 165
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4840 | 2024-10-09T22:52:23.565Z | DEBG | test_utilization (SEC): saga log event
new_state = N166 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4841 | 2024-10-09T22:52:23.565Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 166
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4842 | 2024-10-09T22:52:23.586Z | DEBG | test_utilization (SEC): saga log event
new_state = N166 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4843 | 2024-10-09T22:52:23.587Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 166
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4844 | 2024-10-09T22:52:23.595Z | DEBG | test_utilization (SEC): saga log event
new_state = N168 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4845 | 2024-10-09T22:52:23.595Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 168
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4846 | 2024-10-09T22:52:23.598Z | DEBG | test_utilization (SEC): saga log event
new_state = N168 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4847 | 2024-10-09T22:52:23.599Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 168
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4848 | 2024-10-09T22:52:23.603Z | INFO | test_utilization (SEC): update for saga cached state
new_state = Done
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4849 | 2024-10-09T22:52:23.603Z | INFO | test_utilization (SecStore): updating state
new_state = done
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
|
4850 | 2024-10-09T22:52:23.620Z | INFO | test_utilization (SEC): saga finished
result = success
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4851 | 2024-10-09T22:52:23.622Z | INFO | test_utilization (SagaExecutor): saga finished
saga_id = efa9006f-79aa-47d4-afc3-ac74f6c15580
saga_name = instance-create
saga_result = SagaResult { saga_id: efa9006f-79aa-47d4-afc3-ac74f6c15580, saga_log: SagaLog { saga_id: efa9006f-79aa-47d4-afc3-ac74f6c15580, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("80d20301-e96d-4dc3-a0b3-ffda8be242f6")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7fab3021-94e6-4b8c-b3d7-a08048b00e47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("63aa3793-c46b-4496-aec7-f6ffcb73f055"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9e99c281-26b0-4b2c-9ff5-d09df34760c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("05c44e1d-6dfa-40a5-bc3e-d82d31031270"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2615f582-9e49-4076-b807-b0a05c74ba74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0bb738d5-fd52-48fb-8743-9b1b00d4b6df"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d9369908-4e97-4240-9079-10ff9a3d6f58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("38e5bcac-f89f-4852-a65e-f32764ffd690"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("7b95e66d-8785-45e7-9b30-32fab3dbaa9c")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0c49f2bd-68d2-42e0-94f6-9743edac67ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Null), 40: Succeeded(Null), 41: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f30a5e5d-d85e-4ed7-87c5-8ef9bf5d0263"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("8d6ed561-c206-441c-82f0-2d2c8dfc2fff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("6d6552f3-d0d7-4c33-aecb-61afacc69ea8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9878641e-15e1-4420-ba2a-eff3f705c57a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d040bc93-d17c-4802-bf66-cb4e70528fc7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("09571873-401c-46d9-9a91-bce49f3adbff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("13f38b8c-e7d5-43d9-b7ce-7ff1043b9479"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("fa14058e-b426-43e4-8e72-1758f9627b6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("dc21f576-55dd-4d00-a40b-9ab4656cdc19"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("62be35ee-9cb1-48dd-88ab-1904ee3b78b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2b7bf2a6-efe3-4e9a-b2b0-16d1aafb06cc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3fe8375b-3d13-4e0b-ab2a-e9ee66894203"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c4cec854-dcf2-4b85-9e97-1895fe75ad58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("e8db60e5-2693-4c37-a450-e56ff87c50e2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2c393be5-8ca0-451d-a2bf-5a33f17df3c0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9d9c1904-8189-45a6-be5b-1b6aa8bd4b51"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("aff35c8c-f729-41e6-9769-be86fed938ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f5826e28-7b49-4da1-bbf6-1858a7021d65"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bd36d4d-c0cc-4cb8-84d6-1a0612246629"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("968fe93f-ca8e-4ca1-8e02-51d6b1e39164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("daed1120-f7c9-4a78-aa8a-4ba5ed21f149"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("536265c9-d618-4a38-b788-bf0f584062d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c603bed4-18d9-4250-965c-647ba194fa88"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("07605532-9e8c-49d7-8b16-0e39754c9d90"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("670083fb-8463-4124-8467-503e2a6bf33c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bb3ea71-bb81-427f-8922-ece08c84881b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("69003053-edcf-48c1-bbb3-fa0c0db287cd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7b5a1476-4e3b-4099-9ffc-7dfb44a7c251"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f255b540-23e4-41f1-bd84-d6e7c30c7cb9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("1eb7874f-a60d-45aa-98eb-c4b9bf41b172"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("641c62fc-11ca-4510-825d-80c592678fca"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Null, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Null, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0c49f2bd-68d2-42e0-94f6-9743edac67ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f30a5e5d-d85e-4ed7-87c5-8ef9bf5d0263"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("62be35ee-9cb1-48dd-88ab-1904ee3b78b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2b7bf2a6-efe3-4e9a-b2b0-16d1aafb06cc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3fe8375b-3d13-4e0b-ab2a-e9ee66894203"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c4cec854-dcf2-4b85-9e97-1895fe75ad58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("e8db60e5-2693-4c37-a450-e56ff87c50e2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2c393be5-8ca0-451d-a2bf-5a33f17df3c0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9d9c1904-8189-45a6-be5b-1b6aa8bd4b51"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("aff35c8c-f729-41e6-9769-be86fed938ef"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f5826e28-7b49-4da1-bbf6-1858a7021d65"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bd36d4d-c0cc-4cb8-84d6-1a0612246629"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("8d6ed561-c206-441c-82f0-2d2c8dfc2fff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("968fe93f-ca8e-4ca1-8e02-51d6b1e39164"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("daed1120-f7c9-4a78-aa8a-4ba5ed21f149"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("536265c9-d618-4a38-b788-bf0f584062d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("c603bed4-18d9-4250-965c-647ba194fa88"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("07605532-9e8c-49d7-8b16-0e39754c9d90"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("670083fb-8463-4124-8467-503e2a6bf33c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("3bb3ea71-bb81-427f-8922-ece08c84881b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("69003053-edcf-48c1-bbb3-fa0c0db287cd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7b5a1476-4e3b-4099-9ffc-7dfb44a7c251"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("f255b540-23e4-41f1-bd84-d6e7c30c7cb9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("6d6552f3-d0d7-4c33-aecb-61afacc69ea8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("1eb7874f-a60d-45aa-98eb-c4b9bf41b172"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("641c62fc-11ca-4510-825d-80c592678fca"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9878641e-15e1-4420-ba2a-eff3f705c57a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d040bc93-d17c-4802-bf66-cb4e70528fc7"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("09571873-401c-46d9-9a91-bce49f3adbff"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("13f38b8c-e7d5-43d9-b7ce-7ff1043b9479"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("fa14058e-b426-43e4-8e72-1758f9627b6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("dc21f576-55dd-4d00-a40b-9ab4656cdc19"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("7fab3021-94e6-4b8c-b3d7-a08048b00e47"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("63aa3793-c46b-4496-aec7-f6ffcb73f055"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("9e99c281-26b0-4b2c-9ff5-d09df34760c9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("05c44e1d-6dfa-40a5-bc3e-d82d31031270"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("2615f582-9e49-4076-b807-b0a05c74ba74"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("0bb738d5-fd52-48fb-8743-9b1b00d4b6df"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("d9369908-4e97-4240-9079-10ff9a3d6f58"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "new_id": String("38e5bcac-f89f-4852-a65e-f32764ffd690"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"utilization-test-instance\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("utilization-test-instance"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("7b95e66d-8785-45e7-9b30-32fab3dbaa9c"), "stopped_instance": Null} }) }
|
4852 | 2024-10-09T22:52:23.626Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4853 | 2024-10-09T22:52:23.626Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4854 | 2024-10-09T22:52:23.626Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4855 | 2024-10-09T22:52:23.626Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4856 | 2024-10-09T22:52:23.626Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4857 | 2024-10-09T22:52:23.626Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4858 | 2024-10-09T22:52:23.630Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4859 | 2024-10-09T22:52:23.630Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4860 | 2024-10-09T22:52:23.631Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4861 | 2024-10-09T22:52:23.634Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
uri = /v1/instances?project=utilization-test-project
|
4862 | 2024-10-09T22:52:23.634Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
4863 | 2024-10-09T22:52:23.634Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4864 | 2024-10-09T22:52:23.634Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4865 | 2024-10-09T22:52:23.635Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4866 | 2024-10-09T22:52:23.639Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
4867 | 2024-10-09T22:52:23.639Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4868 | 2024-10-09T22:52:23.639Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4869 | 2024-10-09T22:52:23.640Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4870 | 2024-10-09T22:52:23.643Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
4871 | 2024-10-09T22:52:23.643Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4872 | 2024-10-09T22:52:23.643Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4873 | 2024-10-09T22:52:23.644Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4874 | 2024-10-09T22:52:23.655Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
4875 | 2024-10-09T22:52:23.662Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4876 | 2024-10-09T22:52:23.662Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
uri = /v1/instances?project=utilization-test-project
|
4877 | 2024-10-09T22:52:23.662Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
4878 | 2024-10-09T22:52:23.662Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4879 | 2024-10-09T22:52:23.662Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4880 | 2024-10-09T22:52:23.663Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4881 | 2024-10-09T22:52:23.666Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
4882 | 2024-10-09T22:52:23.666Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4883 | 2024-10-09T22:52:23.666Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4884 | 2024-10-09T22:52:23.666Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4885 | 2024-10-09T22:52:23.669Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
4886 | 2024-10-09T22:52:23.669Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4887 | 2024-10-09T22:52:23.669Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4888 | 2024-10-09T22:52:23.670Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4889 | 2024-10-09T22:52:23.682Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
4890 | 2024-10-09T22:52:23.690Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4891 | 2024-10-09T22:52:23.690Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
4892 | 2024-10-09T22:52:23.690Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
4893 | 2024-10-09T22:52:23.691Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
4894 | 2024-10-09T22:52:23.700Z | INFO | test_utilization (SagaExecutor): preparing saga
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
|
4895 | 2024-10-09T22:52:23.700Z | INFO | test_utilization (SEC): saga create
dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"the-host","identity":{"description":"instance \\"utilization-test-instance\\"","id":"80d20301-e96d-4dc3-a0b3-ffda8be242f6","name":"utilization-test-instance","time_created":"2024-10-09T22:52:20.314168Z","time_deleted":null,"time_modified":"2024-10-09T22:52:20.314168Z"},"memory":1073741824,"ncpus":4,"project_id":"bc93506d-8840-4506-aa4b-ed0643818506","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2024-10-09T22:52:20.314168Z"},"updater_gen":1,"updater_id":null,"user_data":[35,99,108,111,117,100,45,99,111,110,102,105,103,10,115,121,115,116,101,109,95,105,110,102,111,58,10,32,32,100,101,102,97,117,108,116,95,117,115,101,114,58,10,32,32,32,32,110,97,109,101,58,32,111,120,105,100,101]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10}
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4896 | 2024-10-09T22:52:23.701Z | INFO | test_utilization (SecStore): creating saga
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
|
4897 | 2024-10-09T22:52:23.708Z | INFO | test_utilization (SagaExecutor): starting saga
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
|
4898 | 2024-10-09T22:52:23.708Z | INFO | test_utilization (SEC): saga start
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4899 | 2024-10-09T22:52:23.708Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4900 | 2024-10-09T22:52:23.708Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4901 | 2024-10-09T22:52:23.714Z | DEBG | test_utilization (SEC): saga log event
new_state = N010 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4902 | 2024-10-09T22:52:23.715Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 10
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4903 | 2024-10-09T22:52:23.719Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4904 | 2024-10-09T22:52:23.719Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4905 | 2024-10-09T22:52:23.726Z | DEBG | test_utilization (SEC): saga log event
new_state = N000 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4906 | 2024-10-09T22:52:23.726Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("0cea7f42-4a06-41d5-8865-514f85e06067"))
node_id = 0
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4907 | 2024-10-09T22:52:23.731Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4908 | 2024-10-09T22:52:23.731Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4909 | 2024-10-09T22:52:23.734Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4910 | 2024-10-09T22:52:23.734Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4911 | 2024-10-09T22:52:23.735Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4912 | 2024-10-09T22:52:23.751Z | INFO | test_utilization (InstanceAllocator): found 1 available sled targets
sled_ids = [b6d65341-167c-41df-9b5c-41cded99c229]
|
4913 | 2024-10-09T22:52:23.808Z | DEBG | test_utilization (SEC): saga log event
new_state = N001 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4914 | 2024-10-09T22:52:23.808Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229"))
node_id = 1
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4915 | 2024-10-09T22:52:23.816Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4916 | 2024-10-09T22:52:23.816Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4917 | 2024-10-09T22:52:23.820Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AllocPropolisIp
|
4918 | 2024-10-09T22:52:23.820Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AllocPropolisIp
|
4919 | 2024-10-09T22:52:23.821Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AllocPropolisIp
|
4920 | 2024-10-09T22:52:23.829Z | DEBG | test_utilization (SEC): saga log event
new_state = N002 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4921 | 2024-10-09T22:52:23.829Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(String("::1:0"))
node_id = 2
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4922 | 2024-10-09T22:52:23.833Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4923 | 2024-10-09T22:52:23.833Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4924 | 2024-10-09T22:52:23.836Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = CreateVmmRecord
|
4925 | 2024-10-09T22:52:23.836Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = CreateVmmRecord
|
4926 | 2024-10-09T22:52:23.837Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = CreateVmmRecord
|
4927 | 2024-10-09T22:52:23.903Z | DEBG | test_utilization (SEC): saga log event
new_state = N003 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4928 | 2024-10-09T22:52:23.903Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2024-10-09T22:52:23.836604Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null})
node_id = 3
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4929 | 2024-10-09T22:52:23.907Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4930 | 2024-10-09T22:52:23.907Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4931 | 2024-10-09T22:52:23.911Z | INFO | test_utilization (SagaExecutor): moving instance to Starting state via saga
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
propolis_id = 0cea7f42-4a06-41d5-8865-514f85e06067
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
start_reason = AutoStart
|
4932 | 2024-10-09T22:52:23.911Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4933 | 2024-10-09T22:52:23.911Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4934 | 2024-10-09T22:52:23.912Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4935 | 2024-10-09T22:52:23.915Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4936 | 2024-10-09T22:52:23.915Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4937 | 2024-10-09T22:52:23.916Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4938 | 2024-10-09T22:52:23.918Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4939 | 2024-10-09T22:52:23.918Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4940 | 2024-10-09T22:52:23.919Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4941 | 2024-10-09T22:52:23.921Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4942 | 2024-10-09T22:52:23.921Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4943 | 2024-10-09T22:52:23.921Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4944 | 2024-10-09T22:52:23.921Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4945 | 2024-10-09T22:52:23.922Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4946 | 2024-10-09T22:52:23.924Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4947 | 2024-10-09T22:52:23.925Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4948 | 2024-10-09T22:52:23.925Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4949 | 2024-10-09T22:52:23.925Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4950 | 2024-10-09T22:52:23.928Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4951 | 2024-10-09T22:52:23.928Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4952 | 2024-10-09T22:52:23.928Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4953 | 2024-10-09T22:52:23.928Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4954 | 2024-10-09T22:52:23.931Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4955 | 2024-10-09T22:52:23.942Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4956 | 2024-10-09T22:52:23.942Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4957 | 2024-10-09T22:52:23.942Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4958 | 2024-10-09T22:52:23.942Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4959 | 2024-10-09T22:52:23.942Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4960 | 2024-10-09T22:52:23.942Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4961 | 2024-10-09T22:52:23.971Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4962 | 2024-10-09T22:52:23.971Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4963 | 2024-10-09T22:52:23.971Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4964 | 2024-10-09T22:52:23.972Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4965 | 2024-10-09T22:52:23.978Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4966 | 2024-10-09T22:52:23.978Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4967 | 2024-10-09T22:52:23.978Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4968 | 2024-10-09T22:52:23.978Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4969 | 2024-10-09T22:52:23.982Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4970 | 2024-10-09T22:52:23.992Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4971 | 2024-10-09T22:52:23.992Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4972 | 2024-10-09T22:52:23.992Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4973 | 2024-10-09T22:52:23.993Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = MarkAsStarting
|
4974 | 2024-10-09T22:52:24.011Z | DEBG | test_utilization (SEC): saga log event
new_state = N004 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4975 | 2024-10-09T22:52:24.011Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]})
node_id = 4
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4976 | 2024-10-09T22:52:24.027Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
4977 | 2024-10-09T22:52:24.027Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
4978 | 2024-10-09T22:52:24.040Z | INFO | test_utilization (SagaExecutor): start saga: ensuring instance dpd configuration
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
start_reason = AutoStart
|
4979 | 2024-10-09T22:52:24.040Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4980 | 2024-10-09T22:52:24.040Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4981 | 2024-10-09T22:52:24.041Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4982 | 2024-10-09T22:52:24.071Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
4983 | 2024-10-09T22:52:24.071Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
4984 | 2024-10-09T22:52:24.071Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4985 | 2024-10-09T22:52:24.071Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4986 | 2024-10-09T22:52:24.072Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4987 | 2024-10-09T22:52:24.109Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
4988 | 2024-10-09T22:52:24.115Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
4989 | 2024-10-09T22:52:24.115Z | INFO | test_utilization (nexus): looking up instance's primary network interface
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
|
4990 | 2024-10-09T22:52:24.115Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4991 | 2024-10-09T22:52:24.115Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4992 | 2024-10-09T22:52:24.116Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4993 | 2024-10-09T22:52:24.141Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4994 | 2024-10-09T22:52:24.141Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4995 | 2024-10-09T22:52:24.142Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4996 | 2024-10-09T22:52:24.147Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4997 | 2024-10-09T22:52:24.147Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4998 | 2024-10-09T22:52:24.148Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
4999 | 2024-10-09T22:52:24.156Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5000 | 2024-10-09T22:52:24.157Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5001 | 2024-10-09T22:52:24.157Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5002 | 2024-10-09T22:52:24.157Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5003 | 2024-10-09T22:52:24.157Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5004 | 2024-10-09T22:52:24.180Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5005 | 2024-10-09T22:52:24.180Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5006 | 2024-10-09T22:52:24.180Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5007 | 2024-10-09T22:52:24.181Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5008 | 2024-10-09T22:52:24.188Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5009 | 2024-10-09T22:52:24.188Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5010 | 2024-10-09T22:52:24.189Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5011 | 2024-10-09T22:52:24.190Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5012 | 2024-10-09T22:52:24.199Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5013 | 2024-10-09T22:52:24.207Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5014 | 2024-10-09T22:52:24.207Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5015 | 2024-10-09T22:52:24.207Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5016 | 2024-10-09T22:52:24.208Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5017 | 2024-10-09T22:52:24.208Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5018 | 2024-10-09T22:52:24.208Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5019 | 2024-10-09T22:52:24.209Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5020 | 2024-10-09T22:52:24.209Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
5021 | 2024-10-09T22:52:24.210Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
5022 | 2024-10-09T22:52:24.213Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5023 | 2024-10-09T22:52:24.213Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5024 | 2024-10-09T22:52:24.213Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5025 | 2024-10-09T22:52:24.214Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5026 | 2024-10-09T22:52:24.218Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
5027 | 2024-10-09T22:52:24.218Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:23.528153617","datum":4}\n
|
5028 | 2024-10-09T22:52:24.221Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5029 | 2024-10-09T22:52:24.221Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5030 | 2024-10-09T22:52:24.222Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5031 | 2024-10-09T22:52:24.223Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5032 | 2024-10-09T22:52:24.224Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
5033 | 2024-10-09T22:52:24.224Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5034 | 2024-10-09T22:52:24.230Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5035 | 2024-10-09T22:52:24.237Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5036 | 2024-10-09T22:52:24.237Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5037 | 2024-10-09T22:52:24.237Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5038 | 2024-10-09T22:52:24.238Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5039 | 2024-10-09T22:52:24.249Z | INFO | test_utilization (nexus): looking up instance's external IPs
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
|
5040 | 2024-10-09T22:52:24.249Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5041 | 2024-10-09T22:52:24.249Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5042 | 2024-10-09T22:52:24.250Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5043 | 2024-10-09T22:52:24.258Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5044 | 2024-10-09T22:52:24.258Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5045 | 2024-10-09T22:52:24.259Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = DpdEnsure
|
5046 | 2024-10-09T22:52:24.278Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
|
5047 | 2024-10-09T22:52:24.278Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5048 | 2024-10-09T22:52:24.278Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5049 | 2024-10-09T22:52:24.278Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5050 | 2024-10-09T22:52:24.278Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5051 | 2024-10-09T22:52:24.284Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5052 | 2024-10-09T22:52:24.288Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
result = Ok(())
|
5053 | 2024-10-09T22:52:24.288Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5054 | 2024-10-09T22:52:24.288Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5055 | 2024-10-09T22:52:24.289Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5056 | 2024-10-09T22:52:24.295Z | DEBG | test_utilization (SEC): saga log event
new_state = N005 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5057 | 2024-10-09T22:52:24.295Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 5
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5058 | 2024-10-09T22:52:24.303Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5059 | 2024-10-09T22:52:24.303Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5060 | 2024-10-09T22:52:24.310Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = v2p_manager
iteration = 2
reason = Signaled
|
5061 | 2024-10-09T22:52:24.310Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5062 | 2024-10-09T22:52:24.310Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5063 | 2024-10-09T22:52:24.312Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5064 | 2024-10-09T22:52:24.312Z | DEBG | test_utilization (SEC): saga log event
new_state = N006 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5065 | 2024-10-09T22:52:24.312Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 6
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5066 | 2024-10-09T22:52:24.321Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5067 | 2024-10-09T22:52:24.321Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5068 | 2024-10-09T22:52:24.326Z | INFO | test_utilization (SagaExecutor): start saga: ensuring instance is registered on sled
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
start_reason = AutoStart
|
5069 | 2024-10-09T22:52:24.326Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5070 | 2024-10-09T22:52:24.326Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5071 | 2024-10-09T22:52:24.327Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5072 | 2024-10-09T22:52:24.332Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5073 | 2024-10-09T22:52:24.332Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5074 | 2024-10-09T22:52:24.333Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5075 | 2024-10-09T22:52:24.334Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5076 | 2024-10-09T22:52:24.334Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5077 | 2024-10-09T22:52:24.334Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5078 | 2024-10-09T22:52:24.337Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5079 | 2024-10-09T22:52:24.338Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5080 | 2024-10-09T22:52:24.338Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5081 | 2024-10-09T22:52:24.341Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5082 | 2024-10-09T22:52:24.341Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5083 | 2024-10-09T22:52:24.342Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5084 | 2024-10-09T22:52:24.342Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5085 | 2024-10-09T22:52:24.343Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5086 | 2024-10-09T22:52:24.348Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5087 | 2024-10-09T22:52:24.348Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5088 | 2024-10-09T22:52:24.348Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5089 | 2024-10-09T22:52:24.349Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5090 | 2024-10-09T22:52:24.352Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5091 | 2024-10-09T22:52:24.352Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5092 | 2024-10-09T22:52:24.352Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5093 | 2024-10-09T22:52:24.353Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5094 | 2024-10-09T22:52:24.358Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5095 | 2024-10-09T22:52:24.367Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5096 | 2024-10-09T22:52:24.367Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5097 | 2024-10-09T22:52:24.367Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5098 | 2024-10-09T22:52:24.367Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5099 | 2024-10-09T22:52:24.367Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5100 | 2024-10-09T22:52:24.368Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5101 | 2024-10-09T22:52:24.372Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5102 | 2024-10-09T22:52:24.372Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5103 | 2024-10-09T22:52:24.372Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5104 | 2024-10-09T22:52:24.372Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5105 | 2024-10-09T22:52:24.377Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5106 | 2024-10-09T22:52:24.377Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5107 | 2024-10-09T22:52:24.377Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5108 | 2024-10-09T22:52:24.385Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5109 | 2024-10-09T22:52:24.389Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5110 | 2024-10-09T22:52:24.396Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5111 | 2024-10-09T22:52:24.397Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5112 | 2024-10-09T22:52:24.397Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5113 | 2024-10-09T22:52:24.397Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5114 | 2024-10-09T22:52:24.397Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5115 | 2024-10-09T22:52:24.398Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5116 | 2024-10-09T22:52:24.402Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5117 | 2024-10-09T22:52:24.403Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5118 | 2024-10-09T22:52:24.403Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5119 | 2024-10-09T22:52:24.403Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5120 | 2024-10-09T22:52:24.408Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
5121 | 2024-10-09T22:52:24.408Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5122 | 2024-10-09T22:52:24.408Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5123 | 2024-10-09T22:52:24.408Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5124 | 2024-10-09T22:52:24.409Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5125 | 2024-10-09T22:52:24.409Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5126 | 2024-10-09T22:52:24.409Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5127 | 2024-10-09T22:52:24.409Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5128 | 2024-10-09T22:52:24.410Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5129 | 2024-10-09T22:52:24.412Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5130 | 2024-10-09T22:52:24.419Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
5131 | 2024-10-09T22:52:24.419Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
5132 | 2024-10-09T22:52:24.419Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5133 | 2024-10-09T22:52:24.419Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5134 | 2024-10-09T22:52:24.419Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5135 | 2024-10-09T22:52:24.420Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5136 | 2024-10-09T22:52:24.421Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5137 | 2024-10-09T22:52:24.431Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5138 | 2024-10-09T22:52:24.431Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5139 | 2024-10-09T22:52:24.431Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5140 | 2024-10-09T22:52:24.431Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5141 | 2024-10-09T22:52:24.433Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5142 | 2024-10-09T22:52:24.439Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
5143 | 2024-10-09T22:52:24.439Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5144 | 2024-10-09T22:52:24.439Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5145 | 2024-10-09T22:52:24.439Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5146 | 2024-10-09T22:52:24.440Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5147 | 2024-10-09T22:52:24.440Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5148 | 2024-10-09T22:52:24.440Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5149 | 2024-10-09T22:52:24.440Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5150 | 2024-10-09T22:52:24.441Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5151 | 2024-10-09T22:52:24.445Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5152 | 2024-10-09T22:52:24.445Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5153 | 2024-10-09T22:52:24.446Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5154 | 2024-10-09T22:52:24.447Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5155 | 2024-10-09T22:52:24.617Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:56969/v2p
|
5156 | 2024-10-09T22:52:24.617Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:56969
remote_addr = [::1]:39628
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
5157 | 2024-10-09T22:52:24.618Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5158 | 2024-10-09T22:52:24.618Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:39628
req_id = a43df47a-61ce-40bc-a55a-871da6b075e1
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
5159 | 2024-10-09T22:52:24.620Z | INFO | test_utilization (dropshot): request completed
latency_us = 1875
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:39628
req_id = a43df47a-61ce-40bc-a55a-871da6b075e1
response_code = 200
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
5160 | 2024-10-09T22:52:24.620Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5161 | 2024-10-09T22:52:24.620Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5162 | 2024-10-09T22:52:24.620Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5163 | 2024-10-09T22:52:24.623Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5164 | 2024-10-09T22:52:24.626Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5165 | 2024-10-09T22:52:24.626Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:56969/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "a43df47a-61ce-40bc-a55a-871da6b075e1", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5166 | 2024-10-09T22:52:24.626Z | INFO | test_utilization (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-039be560
|
5167 | 2024-10-09T22:52:24.626Z | INFO | test_utilization (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-039be560
|
5168 | 2024-10-09T22:52:24.626Z | INFO | test_utilization (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(8221063) }]
sled = sim-039be560
|
5169 | 2024-10-09T22:52:24.626Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
body = Some(Body)
method = PUT
uri = http://[::1]:56969/v2p
|
5170 | 2024-10-09T22:52:24.628Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:39628
req_id = 2f8195bb-b98f-4115-859c-303f89d815aa
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
5171 | 2024-10-09T22:52:24.628Z | INFO | test_utilization (dropshot): request completed
latency_us = 850
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:39628
req_id = 2f8195bb-b98f-4115-859c-303f89d815aa
response_code = 204
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /v2p
|
5172 | 2024-10-09T22:52:24.629Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:56969/v2p", status: 204, headers: {"x-request-id": "2f8195bb-b98f-4115-859c-303f89d815aa", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5173 | 2024-10-09T22:52:24.631Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:41369/v2p
|
5174 | 2024-10-09T22:52:24.631Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5175 | 2024-10-09T22:52:24.640Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5176 | 2024-10-09T22:52:24.640Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5177 | 2024-10-09T22:52:24.640Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5178 | 2024-10-09T22:52:24.641Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5179 | 2024-10-09T22:52:24.642Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:42158
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5180 | 2024-10-09T22:52:24.644Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:42158
req_id = b9dcd232-011b-485f-8b1c-98a2ceeb2c58
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5181 | 2024-10-09T22:52:24.644Z | INFO | test_utilization (dropshot): request completed
latency_us = 249
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:42158
req_id = b9dcd232-011b-485f-8b1c-98a2ceeb2c58
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5182 | 2024-10-09T22:52:24.644Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:41369/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "b9dcd232-011b-485f-8b1c-98a2ceeb2c58", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5183 | 2024-10-09T22:52:24.644Z | INFO | test_utilization (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-b6d65341
|
5184 | 2024-10-09T22:52:24.644Z | INFO | test_utilization (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
5185 | 2024-10-09T22:52:24.645Z | INFO | test_utilization (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(8221063) }]
sled = sim-b6d65341
|
5186 | 2024-10-09T22:52:24.645Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = Some(Body)
method = PUT
uri = http://[::1]:41369/v2p
|
5187 | 2024-10-09T22:52:24.645Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:42158
req_id = ed9236bb-dc7a-4b3f-b437-e13087d420ee
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5188 | 2024-10-09T22:52:24.645Z | INFO | test_utilization (dropshot): request completed
latency_us = 239
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:42158
req_id = ed9236bb-dc7a-4b3f-b437-e13087d420ee
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5189 | 2024-10-09T22:52:24.645Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:41369/v2p", status: 204, headers: {"x-request-id": "ed9236bb-dc7a-4b3f-b437-e13087d420ee", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5190 | 2024-10-09T22:52:24.649Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 338.949923ms
iteration = 2
status = {}
|
5191 | 2024-10-09T22:52:24.649Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5192 | 2024-10-09T22:52:24.649Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5193 | 2024-10-09T22:52:24.650Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5194 | 2024-10-09T22:52:24.653Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5195 | 2024-10-09T22:52:24.653Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5196 | 2024-10-09T22:52:24.655Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5197 | 2024-10-09T22:52:24.659Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5198 | 2024-10-09T22:52:24.659Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5199 | 2024-10-09T22:52:24.667Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5200 | 2024-10-09T22:52:24.686Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5201 | 2024-10-09T22:52:24.686Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5202 | 2024-10-09T22:52:24.687Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5203 | 2024-10-09T22:52:24.689Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5204 | 2024-10-09T22:52:24.689Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5205 | 2024-10-09T22:52:24.690Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5206 | 2024-10-09T22:52:24.694Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5207 | 2024-10-09T22:52:24.694Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5208 | 2024-10-09T22:52:24.694Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5209 | 2024-10-09T22:52:24.694Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5210 | 2024-10-09T22:52:24.695Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5211 | 2024-10-09T22:52:24.705Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5212 | 2024-10-09T22:52:24.705Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5213 | 2024-10-09T22:52:24.705Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5214 | 2024-10-09T22:52:24.707Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5215 | 2024-10-09T22:52:24.715Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5216 | 2024-10-09T22:52:24.715Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5217 | 2024-10-09T22:52:24.715Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5218 | 2024-10-09T22:52:24.717Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5219 | 2024-10-09T22:52:24.724Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5220 | 2024-10-09T22:52:24.741Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5221 | 2024-10-09T22:52:24.743Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5222 | 2024-10-09T22:52:24.743Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5223 | 2024-10-09T22:52:24.743Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5224 | 2024-10-09T22:52:24.743Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5225 | 2024-10-09T22:52:24.743Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5226 | 2024-10-09T22:52:24.748Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5227 | 2024-10-09T22:52:24.748Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5228 | 2024-10-09T22:52:24.748Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5229 | 2024-10-09T22:52:24.749Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5230 | 2024-10-09T22:52:24.753Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5231 | 2024-10-09T22:52:24.753Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5232 | 2024-10-09T22:52:24.753Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5233 | 2024-10-09T22:52:24.754Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5234 | 2024-10-09T22:52:24.769Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5235 | 2024-10-09T22:52:24.777Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5236 | 2024-10-09T22:52:24.777Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5237 | 2024-10-09T22:52:24.777Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5238 | 2024-10-09T22:52:24.778Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5239 | 2024-10-09T22:52:24.781Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5240 | 2024-10-09T22:52:24.781Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5241 | 2024-10-09T22:52:24.782Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5242 | 2024-10-09T22:52:24.784Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5243 | 2024-10-09T22:52:24.784Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5244 | 2024-10-09T22:52:24.785Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5245 | 2024-10-09T22:52:24.788Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5246 | 2024-10-09T22:52:24.788Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5247 | 2024-10-09T22:52:24.789Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5248 | 2024-10-09T22:52:24.791Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5249 | 2024-10-09T22:52:24.791Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5250 | 2024-10-09T22:52:24.791Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5251 | 2024-10-09T22:52:24.791Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5252 | 2024-10-09T22:52:24.792Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5253 | 2024-10-09T22:52:24.797Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5254 | 2024-10-09T22:52:24.797Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5255 | 2024-10-09T22:52:24.797Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5256 | 2024-10-09T22:52:24.798Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5257 | 2024-10-09T22:52:24.802Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5258 | 2024-10-09T22:52:24.802Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5259 | 2024-10-09T22:52:24.802Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5260 | 2024-10-09T22:52:24.803Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5261 | 2024-10-09T22:52:24.816Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5262 | 2024-10-09T22:52:24.827Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5263 | 2024-10-09T22:52:24.827Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5264 | 2024-10-09T22:52:24.827Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5265 | 2024-10-09T22:52:24.827Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5266 | 2024-10-09T22:52:24.828Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5267 | 2024-10-09T22:52:24.828Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5268 | 2024-10-09T22:52:24.833Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5269 | 2024-10-09T22:52:24.833Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5270 | 2024-10-09T22:52:24.833Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5271 | 2024-10-09T22:52:24.835Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5272 | 2024-10-09T22:52:24.838Z | TRAC | test_utilization (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5273 | 2024-10-09T22:52:24.838Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5274 | 2024-10-09T22:52:24.838Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5275 | 2024-10-09T22:52:24.840Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5276 | 2024-10-09T22:52:24.842Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5277 | 2024-10-09T22:52:24.851Z | DEBG | test_utilization (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ByName("default") }
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5278 | 2024-10-09T22:52:24.851Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5279 | 2024-10-09T22:52:24.851Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5280 | 2024-10-09T22:52:24.851Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5281 | 2024-10-09T22:52:24.857Z | DEBG | test_utilization (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {Name("default"): [NetworkInterface { id: 7fab3021-94e6-4b8c-b3d7-a08048b00e47, kind: Instance { id: 80d20301-e96d-4dc3-a0b3-ffda8be242f6 }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(8221063), primary: true, slot: 0, transit_ips: [] }]}
|
5282 | 2024-10-09T22:52:24.858Z | DEBG | test_utilization (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 7fab3021-94e6-4b8c-b3d7-a08048b00e47, kind: Instance { id: 80d20301-e96d-4dc3-a0b3-ffda8be242f6 }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(8221063), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: Some([Vpc(Vni(8221063))]), filter_ports: None, filter_protocols: None, priority: 65534, status: Enabled, targets: [NetworkInterface { id: 7fab3021-94e6-4b8c-b3d7-a08048b00e47, kind: Instance { id: 80d20301-e96d-4dc3-a0b3-ffda8be242f6 }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(8221063), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("22")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 7fab3021-94e6-4b8c-b3d7-a08048b00e47, kind: Instance { id: 80d20301-e96d-4dc3-a0b3-ffda8be242f6 }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(8221063), primary: true, slot: 0, transit_ips: [] }] }]
|
5283 | 2024-10-09T22:52:24.858Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5284 | 2024-10-09T22:52:24.858Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5285 | 2024-10-09T22:52:24.859Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5286 | 2024-10-09T22:52:24.870Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5287 | 2024-10-09T22:52:24.870Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5288 | 2024-10-09T22:52:24.870Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5289 | 2024-10-09T22:52:24.874Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5290 | 2024-10-09T22:52:24.874Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5291 | 2024-10-09T22:52:24.874Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5292 | 2024-10-09T22:52:24.874Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5293 | 2024-10-09T22:52:24.874Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5294 | 2024-10-09T22:52:24.880Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5295 | 2024-10-09T22:52:24.885Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5296 | 2024-10-09T22:52:25.002Z | DEBG | test_utilization (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:41369/vmms/0cea7f42-4a06-41d5-8865-514f85e06067
|
5297 | 2024-10-09T22:52:25.003Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:56763
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5298 | 2024-10-09T22:52:25.003Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:56763
req_id = fc6584e7-a835-4669-9337-9ae2915de2a0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/0cea7f42-4a06-41d5-8865-514f85e06067
|
5299 | 2024-10-09T22:52:25.006Z | INFO | test_utilization (SledAgent): created
id = 0cea7f42-4a06-41d5-8865-514f85e06067
initial_state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2024-10-09T22:52:25.001798684Z }, migration_in: None, migration_out: None }
kind = instances
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5300 | 2024-10-09T22:52:25.006Z | INFO | test_utilization (dropshot): request completed
latency_us = 2942
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:56763
req_id = fc6584e7-a835-4669-9337-9ae2915de2a0
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/0cea7f42-4a06-41d5-8865-514f85e06067
|
5301 | 2024-10-09T22:52:25.006Z | DEBG | test_utilization (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:41369/vmms/0cea7f42-4a06-41d5-8865-514f85e06067", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc6584e7-a835-4669-9337-9ae2915de2a0", "content-length": "131", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5302 | 2024-10-09T22:52:25.007Z | INFO | test_utilization (SagaExecutor): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = 0cea7f42-4a06-41d5-8865-514f85e06067
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2024-10-09T22:52:25.001798684Z }
|
5303 | 2024-10-09T22:52:25.007Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5304 | 2024-10-09T22:52:25.007Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5305 | 2024-10-09T22:52:25.008Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRegistered
|
5306 | 2024-10-09T22:52:25.032Z | DEBG | test_utilization (SEC): saga log event
new_state = N007 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5307 | 2024-10-09T22:52:25.032Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2024-10-09T22:52:25.001798684Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null})
node_id = 7
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5308 | 2024-10-09T22:52:25.054Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5309 | 2024-10-09T22:52:25.055Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5310 | 2024-10-09T22:52:25.066Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AddVirtualResources
|
5311 | 2024-10-09T22:52:25.066Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AddVirtualResources
|
5312 | 2024-10-09T22:52:25.066Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = AddVirtualResources
|
5313 | 2024-10-09T22:52:25.083Z | DEBG | test_utilization (SEC): saga log event
new_state = N008 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5314 | 2024-10-09T22:52:25.087Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 8
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5315 | 2024-10-09T22:52:25.101Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5316 | 2024-10-09T22:52:25.101Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5317 | 2024-10-09T22:52:25.105Z | INFO | test_utilization (SagaExecutor): start saga: ensuring instance is running
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
start_reason = AutoStart
|
5318 | 2024-10-09T22:52:25.105Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5319 | 2024-10-09T22:52:25.105Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5320 | 2024-10-09T22:52:25.106Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5321 | 2024-10-09T22:52:25.108Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5322 | 2024-10-09T22:52:25.108Z | TRAC | test_utilization (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5323 | 2024-10-09T22:52:25.108Z | TRAC | test_utilization (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5324 | 2024-10-09T22:52:25.108Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5325 | 2024-10-09T22:52:25.109Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5326 | 2024-10-09T22:52:25.111Z | DEBG | test_utilization (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5327 | 2024-10-09T22:52:25.116Z | DEBG | test_utilization (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5328 | 2024-10-09T22:52:25.194Z | DEBG | test_utilization (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:41369/vmms/0cea7f42-4a06-41d5-8865-514f85e06067/state
|
5329 | 2024-10-09T22:52:25.195Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:50664
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5330 | 2024-10-09T22:52:25.198Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:50664
req_id = a516a045-4b8a-4477-85aa-b1da84e6647a
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/0cea7f42-4a06-41d5-8865-514f85e06067/state
|
5331 | 2024-10-09T22:52:25.199Z | INFO | test_utilization (SledAgent): noop transition
id = 0cea7f42-4a06-41d5-8865-514f85e06067
kind = instances
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
target = Running
|
5332 | 2024-10-09T22:52:25.199Z | INFO | test_utilization (dropshot): request completed
latency_us = 635
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:50664
req_id = a516a045-4b8a-4477-85aa-b1da84e6647a
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/0cea7f42-4a06-41d5-8865-514f85e06067/state
|
5333 | 2024-10-09T22:52:25.199Z | DEBG | test_utilization (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:41369/vmms/0cea7f42-4a06-41d5-8865-514f85e06067/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "a516a045-4b8a-4477-85aa-b1da84e6647a", "content-length": "151", "date": "Wed, 09 Oct 2024 22:52:24 GMT"} })
|
5334 | 2024-10-09T22:52:25.200Z | INFO | test_utilization (SagaExecutor): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = 0cea7f42-4a06-41d5-8865-514f85e06067
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRunning
vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2024-10-09T22:52:25.001798684Z }
|
5335 | 2024-10-09T22:52:25.200Z | TRAC | test_utilization (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRunning
|
5336 | 2024-10-09T22:52:25.200Z | DEBG | test_utilization (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRunning
|
5337 | 2024-10-09T22:52:25.200Z | DEBG | test_utilization (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_node = EnsureRunning
|
5338 | 2024-10-09T22:52:25.202Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5339 | 2024-10-09T22:52:25.202Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
5340 | 2024-10-09T22:52:25.203Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
5341 | 2024-10-09T22:52:25.209Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
5342 | 2024-10-09T22:52:25.209Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:24.618966039","datum":5}\n
|
5343 | 2024-10-09T22:52:25.219Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
5344 | 2024-10-09T22:52:25.219Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5345 | 2024-10-09T22:52:25.230Z | DEBG | test_utilization (SEC): saga log event
new_state = N009 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5346 | 2024-10-09T22:52:25.231Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 9
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5347 | 2024-10-09T22:52:25.237Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 started
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5348 | 2024-10-09T22:52:25.237Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5349 | 2024-10-09T22:52:25.261Z | DEBG | test_utilization (SEC): saga log event
new_state = N011 succeeded
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5350 | 2024-10-09T22:52:25.261Z | DEBG | test_utilization (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 11
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5351 | 2024-10-09T22:52:25.266Z | INFO | test_utilization (SEC): update for saga cached state
new_state = Done
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5352 | 2024-10-09T22:52:25.266Z | INFO | test_utilization (SecStore): updating state
new_state = done
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
|
5353 | 2024-10-09T22:52:25.282Z | INFO | test_utilization (SEC): saga finished
result = success
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
sec_id = 16bcf290-d2b8-479e-aae0-2fceec228e77
|
5354 | 2024-10-09T22:52:25.282Z | INFO | test_utilization (SagaExecutor): saga finished
saga_id = 4d252352-2fc8-4e7c-afe9-7193b4943687
saga_name = instance-start
saga_result = SagaResult { saga_id: 4d252352-2fc8-4e7c-afe9-7193b4943687, saga_log: SagaLog { saga_id: 4d252352-2fc8-4e7c-afe9-7193b4943687, unwinding: false, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N011 started, N011 succeeded], node_status: {0: Succeeded(String("0cea7f42-4a06-41d5-8865-514f85e06067")), 1: Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")), 2: Succeeded(String("::1:0")), 3: Succeeded(Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2024-10-09T22:52:23.836604Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null}), 4: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2024-10-09T22:52:25.001798684Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"dpd_ensure": Null, "ensure_registered": Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2024-10-09T22:52:25.001798684Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null}, "ensure_running": Null, "propolis_id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "propolis_ip": String("::1:0"), "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "started_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"utilization-test-instance\\""), "id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "name": String("utilization-test-instance"), "time_created": String("2024-10-09T22:52:20.314168Z"), "time_deleted": Null, "time_modified": String("2024-10-09T22:52:20.314168Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("bc93506d-8840-4506-aa4b-ed0643818506"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "time_last_auto_restarted": Null, "time_updated": String("2024-10-09T22:52:20.314168Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "v2p_ensure": Null, "virtual_resources": Null, "vmm_record": Object {"id": String("0cea7f42-4a06-41d5-8865-514f85e06067"), "instance_id": String("80d20301-e96d-4dc3-a0b3-ffda8be242f6"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2024-10-09T22:52:23.836604Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2024-10-09T22:52:23.836604Z"), "time_deleted": Null}} }) }
|
5355 | 2024-10-09T22:52:25.282Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
uri = /v1/instances?project=utilization-test-project
|
5356 | 2024-10-09T22:52:25.282Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
5357 | 2024-10-09T22:52:25.283Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5358 | 2024-10-09T22:52:25.283Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5359 | 2024-10-09T22:52:25.284Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5360 | 2024-10-09T22:52:25.295Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
5361 | 2024-10-09T22:52:25.295Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5362 | 2024-10-09T22:52:25.295Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5363 | 2024-10-09T22:52:25.296Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5364 | 2024-10-09T22:52:25.310Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
5365 | 2024-10-09T22:52:25.311Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5366 | 2024-10-09T22:52:25.311Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5367 | 2024-10-09T22:52:25.311Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5368 | 2024-10-09T22:52:25.324Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
5369 | 2024-10-09T22:52:25.337Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5370 | 2024-10-09T22:52:25.337Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5371 | 2024-10-09T22:52:25.338Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5372 | 2024-10-09T22:52:25.338Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5373 | 2024-10-09T22:52:25.344Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5374 | 2024-10-09T22:52:25.344Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5375 | 2024-10-09T22:52:25.345Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5376 | 2024-10-09T22:52:25.345Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 2
reason = Signaled
|
5377 | 2024-10-09T22:52:25.345Z | INFO | test_utilization (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
5378 | 2024-10-09T22:52:25.345Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
5379 | 2024-10-09T22:52:25.345Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5380 | 2024-10-09T22:52:25.345Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5381 | 2024-10-09T22:52:25.345Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5382 | 2024-10-09T22:52:25.346Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5383 | 2024-10-09T22:52:25.349Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5384 | 2024-10-09T22:52:25.349Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5385 | 2024-10-09T22:52:25.349Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5386 | 2024-10-09T22:52:25.350Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5387 | 2024-10-09T22:52:25.355Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
5388 | 2024-10-09T22:52:25.355Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
5389 | 2024-10-09T22:52:25.355Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5390 | 2024-10-09T22:52:25.355Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5391 | 2024-10-09T22:52:25.355Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5392 | 2024-10-09T22:52:25.355Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5393 | 2024-10-09T22:52:25.357Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5394 | 2024-10-09T22:52:25.357Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5395 | 2024-10-09T22:52:25.357Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5396 | 2024-10-09T22:52:25.358Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5397 | 2024-10-09T22:52:25.363Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
5398 | 2024-10-09T22:52:25.363Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5399 | 2024-10-09T22:52:25.363Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5400 | 2024-10-09T22:52:25.363Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5401 | 2024-10-09T22:52:25.370Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
uri = /v1/instances?project=utilization-test-project
|
5402 | 2024-10-09T22:52:25.370Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
5403 | 2024-10-09T22:52:25.370Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5404 | 2024-10-09T22:52:25.371Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5405 | 2024-10-09T22:52:25.372Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5406 | 2024-10-09T22:52:25.748Z | INFO | test_utilization (BackgroundTasks): VPC route manager sled 039be560-54cc-49e3-88df-1a29dadbf913
background_task = vpc_route_manager
|
5407 | 2024-10-09T22:52:25.748Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:56969/vpc-routes
|
5408 | 2024-10-09T22:52:25.755Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
5409 | 2024-10-09T22:52:25.773Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5410 | 2024-10-09T22:52:25.774Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5411 | 2024-10-09T22:52:25.775Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5412 | 2024-10-09T22:52:25.777Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:56969
remote_addr = [::1]:53584
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
|
5413 | 2024-10-09T22:52:25.777Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5414 | 2024-10-09T22:52:25.778Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
5415 | 2024-10-09T22:52:25.778Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5416 | 2024-10-09T22:52:25.778Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5417 | 2024-10-09T22:52:25.779Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5418 | 2024-10-09T22:52:25.780Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:53584
req_id = de3fe0ff-8ffe-4cd8-b488-b4225d95ffe2
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /vpc-routes
|
5419 | 2024-10-09T22:52:25.781Z | INFO | test_utilization (dropshot): request completed
latency_us = 1307
local_addr = [::1]:56969
method = GET
remote_addr = [::1]:53584
req_id = de3fe0ff-8ffe-4cd8-b488-b4225d95ffe2
response_code = 200
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /vpc-routes
|
5420 | 2024-10-09T22:52:25.782Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5421 | 2024-10-09T22:52:25.782Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:56969/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "de3fe0ff-8ffe-4cd8-b488-b4225d95ffe2", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:25 GMT"} })
|
5422 | 2024-10-09T22:52:25.782Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5423 | 2024-10-09T22:52:25.782Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5424 | 2024-10-09T22:52:25.783Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5425 | 2024-10-09T22:52:25.788Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
5426 | 2024-10-09T22:52:25.810Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5427 | 2024-10-09T22:52:25.813Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
uri = /v1/instances?project=utilization-test-project
|
5428 | 2024-10-09T22:52:25.815Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances?project=utilization-test-project
|
5429 | 2024-10-09T22:52:25.815Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5430 | 2024-10-09T22:52:25.815Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5431 | 2024-10-09T22:52:25.818Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5432 | 2024-10-09T22:52:25.821Z | INFO | test_utilization (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = sim-039be560
|
5433 | 2024-10-09T22:52:25.822Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:56969/eip-gateways
|
5434 | 2024-10-09T22:52:25.822Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:53584
req_id = fdaa3c11-9a9a-4803-bc93-f676af8a31c9
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /eip-gateways
|
5435 | 2024-10-09T22:52:25.823Z | INFO | test_utilization (dropshot): request completed
latency_us = 452
local_addr = [::1]:56969
method = PUT
remote_addr = [::1]:53584
req_id = fdaa3c11-9a9a-4803-bc93-f676af8a31c9
response_code = 204
sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
uri = /eip-gateways
|
5436 | 2024-10-09T22:52:25.823Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=utilization-test-project
|
5437 | 2024-10-09T22:52:25.824Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5438 | 2024-10-09T22:52:25.824Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5439 | 2024-10-09T22:52:25.825Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5440 | 2024-10-09T22:52:25.826Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:56969/eip-gateways", status: 204, headers: {"x-request-id": "fdaa3c11-9a9a-4803-bc93-f676af8a31c9", "date": "Wed, 09 Oct 2024 22:52:25 GMT"} })
|
5441 | 2024-10-09T22:52:25.828Z | INFO | test_utilization (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
5442 | 2024-10-09T22:52:25.828Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:41369/vpc-routes
|
5443 | 2024-10-09T22:52:25.829Z | INFO | test_utilization (dropshot): accepted connection
local_addr = [::1]:41369
remote_addr = [::1]:46299
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5444 | 2024-10-09T22:52:25.845Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:46299
req_id = 9d93c5b7-4846-4499-86f4-7c6895c77ca4
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5445 | 2024-10-09T22:52:25.846Z | INFO | test_utilization (dropshot): request completed
latency_us = 16589
local_addr = [::1]:41369
method = GET
remote_addr = [::1]:46299
req_id = 9d93c5b7-4846-4499-86f4-7c6895c77ca4
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5446 | 2024-10-09T22:52:25.846Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=utilization-test-project
|
5447 | 2024-10-09T22:52:25.846Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5448 | 2024-10-09T22:52:25.847Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5449 | 2024-10-09T22:52:25.847Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5450 | 2024-10-09T22:52:25.848Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:41369/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d93c5b7-4846-4499-86f4-7c6895c77ca4", "content-length": "152", "date": "Wed, 09 Oct 2024 22:52:25 GMT"} })
|
5451 | 2024-10-09T22:52:25.849Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5452 | 2024-10-09T22:52:25.849Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5453 | 2024-10-09T22:52:25.849Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5454 | 2024-10-09T22:52:25.861Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=utilization-test-project
|
5455 | 2024-10-09T22:52:25.888Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ById(80d20301-e96d-4dc3-a0b3-ffda8be242f6) }
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5456 | 2024-10-09T22:52:25.888Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
uri = /v1/instances?project=utilization-test-project
|
5457 | 2024-10-09T22:52:25.888Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
roles = RoleSet { roles: {} }
uri = /v1/instances?project=utilization-test-project
|
5458 | 2024-10-09T22:52:25.889Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
resource = Database
result = Ok(())
uri = /v1/instances?project=utilization-test-project
|
5459 | 2024-10-09T22:52:25.893Z | INFO | test_utilization (BackgroundTasks): computed internet gateway mappings for sled
assocs = {7fab3021-94e6-4b8c-b3d7-a08048b00e47: {10.0.0.0: {55b8dcd1-c908-4045-86f2-1dfc927b3692}}}
background_task = vpc_route_manager
sled = sim-b6d65341
|
5460 | 2024-10-09T22:52:25.893Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:41369/eip-gateways
|
5461 | 2024-10-09T22:52:25.894Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 5748252
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 9f5fd596-40e3-45ba-aab7-f2eea7e10246
response_code = 201
uri = /v1/instances?project=utilization-test-project
|
5462 | 2024-10-09T22:52:25.895Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:46299
req_id = 86824613-1e64-4003-8ebf-418f9e48f349
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
5463 | 2024-10-09T22:52:25.895Z | INFO | test_utilization (dropshot): request completed
latency_us = 357
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:46299
req_id = 86824613-1e64-4003-8ebf-418f9e48f349
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
5464 | 2024-10-09T22:52:25.895Z | INFO | test_utilization (external client test context): client received response
status = 201
|
5465 | 2024-10-09T22:52:25.896Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:39037/v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5466 | 2024-10-09T22:52:25.897Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:41369/eip-gateways", status: 204, headers: {"x-request-id": "86824613-1e64-4003-8ebf-418f9e48f349", "date": "Wed, 09 Oct 2024 22:52:25 GMT"} })
|
5467 | 2024-10-09T22:52:25.897Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5468 | 2024-10-09T22:52:25.897Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5469 | 2024-10-09T22:52:25.897Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5470 | 2024-10-09T22:52:25.898Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5471 | 2024-10-09T22:52:25.898Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5472 | 2024-10-09T22:52:25.898Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5473 | 2024-10-09T22:52:25.898Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5474 | 2024-10-09T22:52:25.898Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5475 | 2024-10-09T22:52:25.899Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5476 | 2024-10-09T22:52:25.919Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5477 | 2024-10-09T22:52:25.919Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5478 | 2024-10-09T22:52:25.920Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5479 | 2024-10-09T22:52:25.927Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5480 | 2024-10-09T22:52:25.927Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5481 | 2024-10-09T22:52:25.928Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5482 | 2024-10-09T22:52:25.934Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5483 | 2024-10-09T22:52:25.934Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5484 | 2024-10-09T22:52:25.934Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5485 | 2024-10-09T22:52:25.940Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
5486 | 2024-10-09T22:52:25.941Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5487 | 2024-10-09T22:52:25.941Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5488 | 2024-10-09T22:52:25.941Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5489 | 2024-10-09T22:52:25.942Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5490 | 2024-10-09T22:52:25.950Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5491 | 2024-10-09T22:52:25.950Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5492 | 2024-10-09T22:52:25.950Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5493 | 2024-10-09T22:52:25.951Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5494 | 2024-10-09T22:52:25.973Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5495 | 2024-10-09T22:52:25.973Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5496 | 2024-10-09T22:52:25.977Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5497 | 2024-10-09T22:52:25.978Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5498 | 2024-10-09T22:52:25.982Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
5499 | 2024-10-09T22:52:25.982Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5500 | 2024-10-09T22:52:25.982Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5501 | 2024-10-09T22:52:25.987Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5502 | 2024-10-09T22:52:25.990Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5503 | 2024-10-09T22:52:25.990Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5504 | 2024-10-09T22:52:25.991Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5505 | 2024-10-09T22:52:25.991Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
5506 | 2024-10-09T22:52:25.991Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5507 | 2024-10-09T22:52:25.991Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5508 | 2024-10-09T22:52:25.991Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5509 | 2024-10-09T22:52:25.992Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5510 | 2024-10-09T22:52:25.994Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5511 | 2024-10-09T22:52:25.994Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5512 | 2024-10-09T22:52:25.995Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5513 | 2024-10-09T22:52:25.996Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5514 | 2024-10-09T22:52:25.996Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5515 | 2024-10-09T22:52:25.996Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5516 | 2024-10-09T22:52:25.997Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5517 | 2024-10-09T22:52:26.013Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5518 | 2024-10-09T22:52:26.013Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5519 | 2024-10-09T22:52:26.019Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5520 | 2024-10-09T22:52:26.049Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5521 | 2024-10-09T22:52:26.054Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
5522 | 2024-10-09T22:52:26.054Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5523 | 2024-10-09T22:52:26.054Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5524 | 2024-10-09T22:52:26.054Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5525 | 2024-10-09T22:52:26.055Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5526 | 2024-10-09T22:52:26.057Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
|
5527 | 2024-10-09T22:52:26.057Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
|
5528 | 2024-10-09T22:52:26.057Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5529 | 2024-10-09T22:52:26.057Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5530 | 2024-10-09T22:52:26.057Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5531 | 2024-10-09T22:52:26.058Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5532 | 2024-10-09T22:52:26.058Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5533 | 2024-10-09T22:52:26.058Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5534 | 2024-10-09T22:52:26.060Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5535 | 2024-10-09T22:52:26.060Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5536 | 2024-10-09T22:52:26.060Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5537 | 2024-10-09T22:52:26.061Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5538 | 2024-10-09T22:52:26.067Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5539 | 2024-10-09T22:52:26.067Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5540 | 2024-10-09T22:52:26.068Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5541 | 2024-10-09T22:52:26.069Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5542 | 2024-10-09T22:52:26.069Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5543 | 2024-10-09T22:52:26.069Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5544 | 2024-10-09T22:52:26.070Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5545 | 2024-10-09T22:52:26.080Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ByName("utilization-test-instance") }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5546 | 2024-10-09T22:52:26.081Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5547 | 2024-10-09T22:52:26.082Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5548 | 2024-10-09T22:52:26.082Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5549 | 2024-10-09T22:52:26.084Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5550 | 2024-10-09T22:52:26.087Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5551 | 2024-10-09T22:52:26.097Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
result = Ok(())
|
5552 | 2024-10-09T22:52:26.097Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user
background_task = vpc_route_manager
|
5553 | 2024-10-09T22:52:26.097Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
|
5554 | 2024-10-09T22:52:26.097Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
|
5555 | 2024-10-09T22:52:26.097Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5556 | 2024-10-09T22:52:26.097Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5557 | 2024-10-09T22:52:26.098Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5558 | 2024-10-09T22:52:26.100Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5559 | 2024-10-09T22:52:26.100Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5560 | 2024-10-09T22:52:26.100Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5561 | 2024-10-09T22:52:26.101Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5562 | 2024-10-09T22:52:26.101Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5563 | 2024-10-09T22:52:26.101Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5564 | 2024-10-09T22:52:26.101Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5565 | 2024-10-09T22:52:26.102Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5566 | 2024-10-09T22:52:26.103Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5567 | 2024-10-09T22:52:26.103Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5568 | 2024-10-09T22:52:26.103Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5569 | 2024-10-09T22:52:26.104Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5570 | 2024-10-09T22:52:26.109Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5571 | 2024-10-09T22:52:26.121Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 3840fbbb-7c81-4ba0-916c-7b54122ff416, lookup_type: ById(3840fbbb-7c81-4ba0-916c-7b54122ff416) }
result = Ok(())
|
5572 | 2024-10-09T22:52:26.121Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5573 | 2024-10-09T22:52:26.121Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5574 | 2024-10-09T22:52:26.121Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5575 | 2024-10-09T22:52:26.123Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5576 | 2024-10-09T22:52:26.123Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5577 | 2024-10-09T22:52:26.123Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5578 | 2024-10-09T22:52:26.123Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5579 | 2024-10-09T22:52:26.131Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5580 | 2024-10-09T22:52:26.131Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5581 | 2024-10-09T22:52:26.132Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5582 | 2024-10-09T22:52:26.134Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5583 | 2024-10-09T22:52:26.143Z | DEBG | test_utilization (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ByName("utilization-test-instance") }
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5584 | 2024-10-09T22:52:26.143Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ByName("utilization-test-instance") }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5585 | 2024-10-09T22:52:26.143Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5586 | 2024-10-09T22:52:26.143Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5587 | 2024-10-09T22:52:26.143Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5588 | 2024-10-09T22:52:26.144Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5589 | 2024-10-09T22:52:26.146Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5590 | 2024-10-09T22:52:26.146Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5591 | 2024-10-09T22:52:26.147Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5592 | 2024-10-09T22:52:26.148Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5593 | 2024-10-09T22:52:26.148Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5594 | 2024-10-09T22:52:26.148Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5595 | 2024-10-09T22:52:26.148Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5596 | 2024-10-09T22:52:26.151Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5597 | 2024-10-09T22:52:26.151Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5598 | 2024-10-09T22:52:26.151Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5599 | 2024-10-09T22:52:26.156Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5600 | 2024-10-09T22:52:26.156Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5601 | 2024-10-09T22:52:26.158Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5602 | 2024-10-09T22:52:26.169Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5603 | 2024-10-09T22:52:26.170Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5604 | 2024-10-09T22:52:26.170Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5605 | 2024-10-09T22:52:26.171Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5606 | 2024-10-09T22:52:26.178Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5607 | 2024-10-09T22:52:26.195Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ByName("utilization-test-project") }, key: 80d20301-e96d-4dc3-a0b3-ffda8be242f6, lookup_type: ByName("utilization-test-instance") }
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5608 | 2024-10-09T22:52:26.195Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5609 | 2024-10-09T22:52:26.195Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
roles = RoleSet { roles: {} }
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5610 | 2024-10-09T22:52:26.196Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
resource = Database
result = Ok(())
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5611 | 2024-10-09T22:52:26.196Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
|
5612 | 2024-10-09T22:52:26.197Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
|
5613 | 2024-10-09T22:52:26.197Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5614 | 2024-10-09T22:52:26.197Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5615 | 2024-10-09T22:52:26.198Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5616 | 2024-10-09T22:52:26.202Z | DEBG | test_utilization (nexus): asked to start an active instance
instance_id = 80d20301-e96d-4dc3-a0b3-ffda8be242f6
start_reason = User
state = Starting
|
5617 | 2024-10-09T22:52:26.202Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 304577
local_addr = 127.0.0.1:39037
method = POST
remote_addr = 127.0.0.1:53166
req_id = 184fda58-681f-4ba2-b401-e188591ea8ed
response_code = 202
uri = /v1/instances/utilization-test-instance/start?project=utilization-test-project
|
5618 | 2024-10-09T22:52:26.205Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5619 | 2024-10-09T22:52:26.205Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5620 | 2024-10-09T22:52:26.205Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5621 | 2024-10-09T22:52:26.207Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5622 | 2024-10-09T22:52:26.209Z | DEBG | test_utilization (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5623 | 2024-10-09T22:52:26.209Z | DEBG | test_utilization (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
|
5624 | 2024-10-09T22:52:26.210Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.fields_string FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"target_name","field_value":"integration-test-target"}\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"field_name":"metric_name","field_value":"integration-test-metric"}\n
|
5625 | 2024-10-09T22:52:26.232Z | INFO | test_utilization (external client test context): client received response
status = 202
|
5626 | 2024-10-09T22:52:26.232Z | INFO | test_utilization (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:39037/v1/system/utilization/silos/default-silo
|
5627 | 2024-10-09T22:52:26.235Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5628 | 2024-10-09T22:52:26.236Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5629 | 2024-10-09T22:52:26.236Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5630 | 2024-10-09T22:52:26.237Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5631 | 2024-10-09T22:52:26.238Z | TRAC | test_utilization (dropshot_external): incoming request
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
uri = /v1/system/utilization/silos/default-silo
|
5632 | 2024-10-09T22:52:26.253Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 2
table_name = oximeter.fields_string
|
5633 | 2024-10-09T22:52:26.253Z | TRAC | test_utilization (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
sql = INSERT INTO oximeter.measurements_i64 FORMAT JSONEachRow\n{"timeseries_name":"integration_target:integration_metric","timeseries_key":3277211643095776014,"timestamp":"2024-10-09 22:52:25.780383637","datum":6}\n
|
5634 | 2024-10-09T22:52:26.255Z | TRAC | test_utilization (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
uri = /v1/system/utilization/silos/default-silo
|
5635 | 2024-10-09T22:52:26.255Z | DEBG | test_utilization (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/utilization/silos/default-silo
|
5636 | 2024-10-09T22:52:26.255Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5637 | 2024-10-09T22:52:26.255Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5638 | 2024-10-09T22:52:26.257Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5639 | 2024-10-09T22:52:26.262Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5640 | 2024-10-09T22:52:26.271Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 986abfd5-df4c-4a54-a5f1-2b1ea54179c0, lookup_type: ByName("default") }
result = Ok(())
|
5641 | 2024-10-09T22:52:26.272Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = vpc_route_manager
|
5642 | 2024-10-09T22:52:26.272Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5643 | 2024-10-09T22:52:26.272Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5644 | 2024-10-09T22:52:26.274Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5645 | 2024-10-09T22:52:26.274Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5646 | 2024-10-09T22:52:26.274Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5647 | 2024-10-09T22:52:26.287Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5648 | 2024-10-09T22:52:26.316Z | DEBG | test_utilization (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = e4a34133-b22f-424a-bc11-56e6119cb3b1
n_rows = 1
table_name = oximeter.measurements_i64
|
5649 | 2024-10-09T22:52:26.316Z | TRAC | test_utilization (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5650 | 2024-10-09T22:52:26.326Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5651 | 2024-10-09T22:52:26.326Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5652 | 2024-10-09T22:52:26.327Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5653 | 2024-10-09T22:52:26.328Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
5654 | 2024-10-09T22:52:26.328Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5655 | 2024-10-09T22:52:26.328Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5656 | 2024-10-09T22:52:26.328Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5657 | 2024-10-09T22:52:26.329Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5658 | 2024-10-09T22:52:26.332Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5659 | 2024-10-09T22:52:26.332Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5660 | 2024-10-09T22:52:26.333Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5661 | 2024-10-09T22:52:26.333Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5662 | 2024-10-09T22:52:26.334Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5663 | 2024-10-09T22:52:26.334Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5664 | 2024-10-09T22:52:26.335Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5665 | 2024-10-09T22:52:26.337Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _nexus._tcp.control-plane.oxide.internal
|
5666 | 2024-10-09T22:52:26.338Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5667 | 2024-10-09T22:52:26.338Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5668 | 2024-10-09T22:52:26.339Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5669 | 2024-10-09T22:52:26.352Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5670 | 2024-10-09T22:52:26.366Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
5671 | 2024-10-09T22:52:26.366Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5672 | 2024-10-09T22:52:26.366Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5673 | 2024-10-09T22:52:26.366Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5674 | 2024-10-09T22:52:26.404Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 55b8dcd1-c908-4045-86f2-1dfc927b3692, lookup_type: ByName("default") }
|
5675 | 2024-10-09T22:52:26.404Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = bc93506d-8840-4506-aa4b-ed0643818506
resource_type = Project
|
5676 | 2024-10-09T22:52:26.404Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5677 | 2024-10-09T22:52:26.404Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5678 | 2024-10-09T22:52:26.405Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5679 | 2024-10-09T22:52:26.407Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
5680 | 2024-10-09T22:52:26.407Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5681 | 2024-10-09T22:52:26.407Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5682 | 2024-10-09T22:52:26.407Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5683 | 2024-10-09T22:52:26.408Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5684 | 2024-10-09T22:52:26.408Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5685 | 2024-10-09T22:52:26.408Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5686 | 2024-10-09T22:52:26.408Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5687 | 2024-10-09T22:52:26.408Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5688 | 2024-10-09T22:52:26.409Z | WARN | test_utilization (oximeter-agent): failed to lookup Nexus IP, will retry
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
delay = 8.753407872s
error = "proto error: io error: No route to host (os error 148)"
file = oximeter/collector/src/agent.rs:834
|
5689 | 2024-10-09T22:52:26.411Z | TRAC | test_utilization (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5690 | 2024-10-09T22:52:26.411Z | TRAC | test_utilization (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5691 | 2024-10-09T22:52:26.411Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5692 | 2024-10-09T22:52:26.412Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5693 | 2024-10-09T22:52:26.412Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5694 | 2024-10-09T22:52:26.412Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5695 | 2024-10-09T22:52:26.412Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5696 | 2024-10-09T22:52:26.412Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5697 | 2024-10-09T22:52:26.415Z | DEBG | test_utilization (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5698 | 2024-10-09T22:52:26.419Z | DEBG | test_utilization (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
5699 | 2024-10-09T22:52:26.419Z | TRAC | test_utilization (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
uri = /v1/system/utilization/silos/default-silo
|
5700 | 2024-10-09T22:52:26.419Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5701 | 2024-10-09T22:52:26.419Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5702 | 2024-10-09T22:52:26.420Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5703 | 2024-10-09T22:52:26.422Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5704 | 2024-10-09T22:52:26.448Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: bc93506d-8840-4506-aa4b-ed0643818506, lookup_type: ById(bc93506d-8840-4506-aa4b-ed0643818506) }, key: 88f461fb-16a8-43c7-b5d3-b42110c60a94, lookup_type: ById(88f461fb-16a8-43c7-b5d3-b42110c60a94) }, key: 55b8dcd1-c908-4045-86f2-1dfc927b3692, lookup_type: ByName("default") }
result = Ok(())
|
5705 | 2024-10-09T22:52:26.449Z | TRAC | test_utilization (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user
background_task = vpc_route_manager
|
5706 | 2024-10-09T22:52:26.453Z | DEBG | test_utilization (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:41369/vpc-routes
|
5707 | 2024-10-09T22:52:26.453Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }
uri = /v1/system/utilization/silos/default-silo
|
5708 | 2024-10-09T22:52:26.453Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/system/utilization/silos/default-silo
|
5709 | 2024-10-09T22:52:26.453Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5710 | 2024-10-09T22:52:26.454Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5711 | 2024-10-09T22:52:26.454Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5712 | 2024-10-09T22:52:26.484Z | TRAC | test_utilization (dropshot): incoming request
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:46299
req_id = 7b227746-a669-4905-8001-498ac260293d
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5713 | 2024-10-09T22:52:26.498Z | INFO | test_utilization (dropshot): request completed
latency_us = 14482
local_addr = [::1]:41369
method = PUT
remote_addr = [::1]:46299
req_id = 7b227746-a669-4905-8001-498ac260293d
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5714 | 2024-10-09T22:52:26.500Z | DEBG | test_utilization (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:41369/vpc-routes", status: 204, headers: {"x-request-id": "7b227746-a669-4905-8001-498ac260293d", "date": "Wed, 09 Oct 2024 22:52:25 GMT"} })
|
5715 | 2024-10-09T22:52:26.517Z | DEBG | test_utilization (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 1.171979933s
iteration = 2
status = {}
|
5716 | 2024-10-09T22:52:26.518Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/utilization/silos/default-silo
|
5717 | 2024-10-09T22:52:26.519Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5718 | 2024-10-09T22:52:26.519Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5719 | 2024-10-09T22:52:26.520Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5720 | 2024-10-09T22:52:26.538Z | DEBG | test_utilization (collection-task): collecting from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5721 | 2024-10-09T22:52:26.541Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/system/utilization/silos/default-silo
|
5722 | 2024-10-09T22:52:26.545Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5723 | 2024-10-09T22:52:26.545Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }
uri = /v1/system/utilization/silos/default-silo
|
5724 | 2024-10-09T22:52:26.545Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/system/utilization/silos/default-silo
|
5725 | 2024-10-09T22:52:26.546Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5726 | 2024-10-09T22:52:26.546Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5727 | 2024-10-09T22:52:26.547Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5728 | 2024-10-09T22:52:26.553Z | TRAC | test_utilization (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/utilization/silos/default-silo
|
5729 | 2024-10-09T22:52:26.553Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5730 | 2024-10-09T22:52:26.553Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5731 | 2024-10-09T22:52:26.556Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5732 | 2024-10-09T22:52:26.560Z | DEBG | test_utilization (collection-task): collected results from producer
address = [::1]:42482
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5733 | 2024-10-09T22:52:26.563Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/system/utilization/silos/default-silo
|
5734 | 2024-10-09T22:52:26.569Z | DEBG | test_utilization (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ByName("default-silo") }
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5735 | 2024-10-09T22:52:26.569Z | TRAC | test_utilization (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
uri = /v1/system/utilization/silos/default-silo
|
5736 | 2024-10-09T22:52:26.569Z | DEBG | test_utilization (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
roles = RoleSet { roles: {} }
uri = /v1/system/utilization/silos/default-silo
|
5737 | 2024-10-09T22:52:26.570Z | DEBG | test_utilization (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
resource = Database
result = Ok(())
uri = /v1/system/utilization/silos/default-silo
|
5738 | 2024-10-09T22:52:26.577Z | INFO | test_utilization (dropshot_external): request completed
latency_us = 338726
local_addr = 127.0.0.1:39037
method = GET
remote_addr = 127.0.0.1:53166
req_id = 42a9137d-1360-4963-b11b-d833e8902817
response_code = 200
uri = /v1/system/utilization/silos/default-silo
|
5739 | 2024-10-09T22:52:26.578Z | INFO | test_utilization (external client test context): client received response
status = 200
|
5740 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = GET
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5741 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = POST
path = /crucible/0/regions
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5742 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = DELETE
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5743 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = GET
path = /crucible/0/regions/{id}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5744 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = GET
path = /crucible/0/regions/{id}/snapshots
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5745 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5746 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = GET
path = /crucible/0/regions/{id}/snapshots/{name}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5747 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = DELETE
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5748 | 2024-10-09T22:52:26.579Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): registered endpoint
kind = storage
local_addr = [::1]:39158
method = POST
path = /crucible/0/regions/{id}/snapshots/{name}/run
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5749 | 2024-10-09T22:52:26.579Z | INFO | test_utilization (Simulated CrucibleAgent Dropshot Server): listening
kind = storage
local_addr = [::1]:39158
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5750 | 2024-10-09T22:52:26.580Z | DEBG | test_utilization (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes
kind = storage
local_addr = [::1]:39158
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5751 | 2024-10-09T22:52:26.580Z | INFO | test_utilization (SledAgent): Created Simulated Crucible Server
address = [::1]:39158
kind = storage
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5752 | 2024-10-09T22:52:26.581Z | INFO | test_utilization (nexus): upserting physical disk
model = test-model
physical_disk_id = 98e1d9e8-9d97-440f-a276-b1bc8b36bd8c
serial = totally-unique-serial: 98e1d9e8-9d97-440f-a276-b1bc8b36bd8c
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
vendor = test-vendor
|
5753 | 2024-10-09T22:52:26.581Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5754 | 2024-10-09T22:52:26.581Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5755 | 2024-10-09T22:52:26.582Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5756 | 2024-10-09T22:52:26.582Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
5757 | 2024-10-09T22:52:26.583Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5758 | 2024-10-09T22:52:26.583Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5759 | 2024-10-09T22:52:26.583Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5760 | 2024-10-09T22:52:26.583Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5761 | 2024-10-09T22:52:26.593Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5762 | 2024-10-09T22:52:26.599Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
5763 | 2024-10-09T22:52:26.711Z | INFO | test_utilization (nexus): upserting zpool
physical_disk_id = 98e1d9e8-9d97-440f-a276-b1bc8b36bd8c
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
zpool_id = 6caf8ecc-b8ef-438f-bda7-00225ccfaebd
|
5764 | 2024-10-09T22:52:26.711Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5765 | 2024-10-09T22:52:26.711Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5766 | 2024-10-09T22:52:26.712Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5767 | 2024-10-09T22:52:26.714Z | TRAC | test_utilization (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
5768 | 2024-10-09T22:52:26.714Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5769 | 2024-10-09T22:52:26.714Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5770 | 2024-10-09T22:52:26.714Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5771 | 2024-10-09T22:52:26.715Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5772 | 2024-10-09T22:52:26.719Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5773 | 2024-10-09T22:52:26.728Z | DEBG | test_utilization (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
5774 | 2024-10-09T22:52:26.763Z | INFO | test_utilization (nexus): upserting dataset
address = [::1]:39158
dataset_id = 46fb5f0b-96d7-48b1-9697-8686186e73f9
zpool_id = 6caf8ecc-b8ef-438f-bda7-00225ccfaebd
|
5775 | 2024-10-09T22:52:26.823Z | TRAC | test_utilization (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Inventory
|
5776 | 2024-10-09T22:52:26.825Z | TRAC | test_utilization (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5777 | 2024-10-09T22:52:26.825Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5778 | 2024-10-09T22:52:26.825Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5779 | 2024-10-09T22:52:26.826Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5780 | 2024-10-09T22:52:26.826Z | DEBG | test_utilization (BackgroundTasks): activating
background_task = inventory_collection
iteration = 5
reason = Signaled
|
5781 | 2024-10-09T22:52:26.826Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
5782 | 2024-10-09T22:52:26.826Z | TRAC | test_utilization (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5783 | 2024-10-09T22:52:26.826Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
5784 | 2024-10-09T22:52:26.826Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
5785 | 2024-10-09T22:52:26.827Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
5786 | 2024-10-09T22:52:26.839Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5787 | 2024-10-09T22:52:26.848Z | DEBG | test_utilization (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Inventory
result = Ok(())
|
5788 | 2024-10-09T22:52:26.849Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5789 | 2024-10-09T22:52:26.849Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5790 | 2024-10-09T22:52:26.850Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5791 | 2024-10-09T22:52:26.865Z | TRAC | test_utilization (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
5792 | 2024-10-09T22:52:26.865Z | DEBG | test_utilization (InternalApi): roles
roles = RoleSet { roles: {} }
|
5793 | 2024-10-09T22:52:26.866Z | DEBG | test_utilization (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
5794 | 2024-10-09T22:52:26.866Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5795 | 2024-10-09T22:52:26.872Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
5796 | 2024-10-09T22:52:26.872Z | TRAC | test_utilization (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
5797 | 2024-10-09T22:52:26.872Z | DEBG | test_utilization (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
5798 | 2024-10-09T22:52:26.879Z | DEBG | test_utilization (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
5799 | 2024-10-09T22:52:26.888Z | DEBG | test_utilization (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = [(136e1f04-b6a6-4c5d-8996-97c6cf8decce, 0)]
|
5800 | 2024-10-09T22:52:26.888Z | TRAC | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
5801 | 2024-10-09T22:52:26.889Z | TRAC | test_utilization (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 28 e6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 (............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:57731
req_id = 4c7f089c-7201-409e-b7a9-840c8b4be28c
|
5802 | 2024-10-09T22:52:26.889Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 10470,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:57731
req_id = 4c7f089c-7201-409e-b7a9-840c8b4be28c
|
5803 | 2024-10-09T22:52:26.889Z | DEBG | test_utilization (store): query key
key = _mgs._tcp
|
5804 | 2024-10-09T22:52:26.890Z | DEBG | test_utilization (store): query key
key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
|
5805 | 2024-10-09T22:52:26.890Z | DEBG | test_utilization (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
5806 | 2024-10-09T22:52:26.890Z | DEBG | test_utilization (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:57731
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55029, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 59689, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }]
req_id = 4c7f089c-7201-409e-b7a9-840c8b4be28c
|
5807 | 2024-10-09T22:52:26.891Z | DEBG | test_utilization (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 55029, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 59689, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 5008, tv_nsec: 721169199 } })
|
5808 | 2024-10-09T22:52:26.891Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
5809 | 2024-10-09T22:52:26.891Z | TRAC | test_utilization (DnsResolver): lookup_service_targets: looking up SRV target
|
5810 | 2024-10-09T22:52:26.892Z | TRAC | test_utilization (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: af 39 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e .9..........-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:64711
req_id = 7310ed4b-9343-4609-8b83-a352f2acea87
|
5811 | 2024-10-09T22:52:26.892Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 44857,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:64711
req_id = 7310ed4b-9343-4609-8b83-a352f2acea87
|
5812 | 2024-10-09T22:52:26.893Z | DEBG | test_utilization (store): query key
key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
|
5813 | 2024-10-09T22:52:26.893Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:64711
query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 7310ed4b-9343-4609-8b83-a352f2acea87
|
5814 | 2024-10-09T22:52:26.893Z | TRAC | test_utilization (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 22 82 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e "...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:58405
req_id = 8e2dbee8-d247-4dff-b674-be1c360190b4
|
5815 | 2024-10-09T22:52:26.894Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 8834,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:58405
req_id = 8e2dbee8-d247-4dff-b674-be1c360190b4
|
5816 | 2024-10-09T22:52:26.894Z | DEBG | test_utilization (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
5817 | 2024-10-09T22:52:26.894Z | DEBG | test_utilization (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:58405
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 8e2dbee8-d247-4dff-b674-be1c360190b4
|
5818 | 2024-10-09T22:52:27.077Z | TRAC | test_utilization (DnsResolver): lookup_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
5819 | 2024-10-09T22:52:27.079Z | TRAC | test_utilization (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 72 81 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c r............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:56233
req_id = 7de20565-cd35-4e9e-b9d8-c28b805f4b17
|
5820 | 2024-10-09T22:52:27.079Z | DEBG | test_utilization (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 29313,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:56233
req_id = 7de20565-cd35-4e9e-b9d8-c28b805f4b17
|
5821 | 2024-10-09T22:52:27.080Z | DEBG | test_utilization (store): query key
key = _clickhouse-admin-keeper._tcp
|
5822 | 2024-10-09T22:52:27.080Z | ERRO | test_utilization (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 29313,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:56233
req_id = 7de20565-cd35-4e9e-b9d8-c28b805f4b17
|
5823 | 2024-10-09T22:52:27.083Z | DEBG | test_utilization (BackgroundTasks): begin collection
background_task = inventory_collection
|
5824 | 2024-10-09T22:52:27.084Z | DEBG | test_utilization (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:55029
|
5825 | 2024-10-09T22:52:27.084Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/ignition
|
5826 | 2024-10-09T22:52:27.115Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "306edae3-f898-47e9-9a22-fa1c548a4670", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:27 GMT"} })
|
5827 | 2024-10-09T22:52:27.116Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0
|
5828 | 2024-10-09T22:52:27.138Z | DEBG | test_utilization (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:55029
result = Ok(Response { url: "http://[::1]:55029/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6150dfd1-f2ed-466b-aaa4-7a441ab09b08", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:27 GMT"} })
|
5829 | 2024-10-09T22:52:27.138Z | DEBG | test_utilization (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:55029
method = GET
uri = http://[::1]:55029/sp/switch/0/component/sp/caboose?firmware_slot=0
|
5830 | 2024-10-09T22:52:27.167Z | DEBG | test_utilization: attempt to fetch latest inventory collection
result = Err(InternalError { internal_message: "unexpected database error: query `SELECT \\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\", \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\", \\"inv_clickhouse_keeper_membership\\".\\"leader_committed_log_index\\", \\"inv_clickhouse_keeper_membership\\".\\"raft_config\\" FROM \\"inv_clickhouse_keeper_membership\\" WHERE (\\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\" = $1) ORDER BY \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\" ASC LIMIT $2` contains a full table/index scan which is explicitly disallowed" })
|