[ Feb 28 06:44:41 Enabled. ] [ Feb 28 06:44:41 Rereading configuration. ] [ Feb 28 06:44:42 Rereading configuration. ] [ Feb 28 06:44:53 Executing start method ("/opt/oxide/lib/svc/manifest/cockroachdb.sh"). ] + set -o errexit + set -o pipefail + . /lib/svc/share/smf_include.sh ++ SMF_EXIT_OK=0 ++ SMF_EXIT_NODAEMON=94 ++ SMF_EXIT_ERR_FATAL=95 ++ SMF_EXIT_ERR_CONFIG=96 ++ SMF_EXIT_MON_DEGRADE=97 ++ SMF_EXIT_MON_OFFLINE=98 ++ SMF_EXIT_ERR_NOSMF=99 ++ SMF_EXIT_ERR_PERM=100 ++ svcprop -c -p config/listen_addr svc:/oxide/cockroachdb:default + LISTEN_ADDR='[fd00:1122:3344:101::4]:32221' ++ svcprop -c -p config/store svc:/oxide/cockroachdb:default + DATASTORE=/data ++ /opt/oxide/internal-dns-cli/bin/dnswait cockroach ++ head -n 5 ++ tr '\n' , note: configured to log to "/dev/stderr" {"msg":"using system configuration","v":0,"name":"dnswait","level":30,"time":"2025-02-28T06:44:53.421286534Z","hostname":"oxz_cockroachdb_37ce8bb9-57cb-4dd4-8aa1-52445f96a222","pid":9737} + JOIN_ADDRS=306dfaae-c4fc-4f95-9576-6a4349e128e1.host.control-plane.oxide.internal.:32221,37ce8bb9-57cb-4dd4-8aa1-52445f96a222.host.control-plane.oxide.internal.:32221,8cd9abc3-7a61-44f3-9aae-450a7fb8dc3c.host.control-plane.oxide.internal.:32221,e5a7b872-656b-46a5-862b-1d6ae16ee6e0.host.control-plane.oxide.internal.:32221,e956a8d8-0cb7-4c1d-ac6a-88c027a4347b.host.control-plane.oxide.internal.:32221, + [[ -z 306dfaae-c4fc-4f95-9576-6a4349e128e1.host.control-plane.oxide.internal.:32221,37ce8bb9-57cb-4dd4-8aa1-52445f96a222.host.control-plane.oxide.internal.:32221,8cd9abc3-7a61-44f3-9aae-450a7fb8dc3c.host.control-plane.oxide.internal.:32221,e5a7b872-656b-46a5-862b-1d6ae16ee6e0.host.control-plane.oxide.internal.:32221,e956a8d8-0cb7-4c1d-ac6a-88c027a4347b.host.control-plane.oxide.internal.:32221, ]] + args=('--insecure' '--listen-addr' "$LISTEN_ADDR" '--http-addr' '127.0.0.1:8080' '--store' "$DATASTORE" '--join' "$JOIN_ADDRS") + exec /opt/oxide/cockroachdb/bin/cockroach start --insecure --listen-addr '[fd00:1122:3344:101::4]:32221' --http-addr 127.0.0.1:8080 --store /data --join 306dfaae-c4fc-4f95-9576-6a4349e128e1.host.control-plane.oxide.internal.:32221,37ce8bb9-57cb-4dd4-8aa1-52445f96a222.host.control-plane.oxide.internal.:32221,8cd9abc3-7a61-44f3-9aae-450a7fb8dc3c.host.control-plane.oxide.internal.:32221,e5a7b872-656b-46a5-862b-1d6ae16ee6e0.host.control-plane.oxide.internal.:32221,e956a8d8-0cb7-4c1d-ac6a-88c027a4347b.host.control-plane.oxide.internal.:32221, [ Feb 28 06:44:53 Method "start" exited with status 0. ] * * WARNING: ALL SECURITY CONTROLS HAVE BEEN DISABLED! * * This mode is intended for non-production testing only. * * In this mode: * - Your cluster is open to any client that can access fd00:1122:3344:101::4. * - Intruders with access to your machine or network can observe client-server traffic. * - Intruders can log in without password and read or write any data in the cluster. * - Intruders can consume all your server's resources and cause unavailability. * * * INFO: To start a secure server without mandating TLS for clients, * consider --accept-sql-without-tls instead. For other options, see: * * - https://go.crdb.dev/issue-v/53404/v22.1 * - https://www.cockroachlabs.com/docs/v22.1/secure-a-cluster.html *