1 | 2025-03-01T00:11:50.101Z | DEBG | test_instance_serial (init_with_steps): Running step start_crdb
|
2 | 2025-03-01T00:11:50.101Z | DEBG | test_instance_serial: Starting CRDB
|
3 | 2025-03-01T00:11:50.101Z | INFO | test_instance_serial: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpkCsabT
|
4 | 2025-03-01T00:11:50.101Z | INFO | test_instance_serial: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/e4d56e3c7515cdd0473c40c83d86cf638c3f9200aae213c4e08263bd7fbbdfa6.tar) to storage directory (/var/tmp/omicron_tmp/.tmpkCsabT/data)
|
5 | 2025-03-01T00:11:50.123Z | INFO | test_instance_serial: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpkCsabT/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpkCsabT/listen-url
|
6 | 2025-03-01T00:11:50.123Z | INFO | test_instance_serial: cockroach environment: BUILDOMAT_JOB_ID=01JN7ET8JVEKFGV4DBY12CVTKJ BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/e4d56e3c7515cdd0473c40c83d86cf638c3f9200aae213c4e08263bd7fbbdfa6.tar GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=a565ec3e069e5ec516fdec16863caf4d2daabe18 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-98bfaf87d6ef69bf/out:/work/oxidecomputer/omicron/target/debug/build/blake3-103919f6041ab3f8/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d2d35fe10b7a6017/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-09797cc11a735103/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-bbc564bfd69a09a3/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b5bcf92b015a4487/out:/work/oxidecomputer/omicron/target/debug/build/tofino-0b7bd292c27101e0/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-98bfaf87d6ef69bf/out:/work/oxidecomputer/omicron/target/debug/build/blake3-103919f6041ab3f8/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d2d35fe10b7a6017/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-09797cc11a735103/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-bbc564bfd69a09a3/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b5bcf92b015a4487/out:/work/oxidecomputer/omicron/target/debug/build/tofino-0b7bd292c27101e0/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib NEXTEST_RUN_ID=4e2a6581-1d15-4109-a286-724f4e70a528 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-3f05508105c4e978/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.84.0-x86_64-unknown-linux-gnu RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/lib/ssl/certs SSL_CERT_FILE=/usr/lib/ssl/certs/ca-certificates.crt TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build __NEXTEST_ATTEMPT=1
|
7 | 2025-03-01T00:11:51.287Z | INFO | test_instance_serial: cockroach pid: 143149
|
8 | 2025-03-01T00:11:51.289Z | INFO | test_instance_serial: cockroach listen URL: postgresql://root@[::1]:32871/omicron?sslmode=disable
|
9 | 2025-03-01T00:11:51.289Z | DEBG | test_instance_serial (init_with_steps): Running step start_clickhouse
|
10 | 2025-03-01T00:11:51.289Z | DEBG | test_instance_serial: Starting Clickhouse
|
11 | 2025-03-01T00:11:52.637Z | DEBG | test_instance_serial (init_with_steps): Running step start_gateway_switch0
|
12 | 2025-03-01T00:11:52.637Z | DEBG | test_instance_serial: Starting Management Gateway
|
13 | 2025-03-01T00:11:52.782Z | DEBG | test_instance_serial (init_with_steps): Running step start_dendrite_switch0
|
14 | 2025-03-01T00:11:52.783Z | DEBG | test_instance_serial: Starting Dendrite for switch0
|
15 | 2025-03-01T00:11:52.873Z | DEBG | test_instance_serial (init_with_steps): Running step start_mgd_switch0
|
16 | 2025-03-01T00:11:52.873Z | DEBG | test_instance_serial: Starting mgd for switch0
|
17 | 2025-03-01T00:11:52.940Z | DEBG | test_instance_serial: mgd port is 43963
|
18 | 2025-03-01T00:11:52.941Z | DEBG | test_instance_serial (init_with_steps): Running step record_switch_dns
|
19 | 2025-03-01T00:11:52.941Z | DEBG | test_instance_serial: Recording DNS for the switch zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
switch_location = switch0
|
20 | 2025-03-01T00:11:52.941Z | DEBG | test_instance_serial (init_with_steps): Running step start_internal_dns
|
21 | 2025-03-01T00:11:52.941Z | INFO | test_instance_serial (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpcbqPkE
|
22 | 2025-03-01T00:11:53.028Z | INFO | test_instance_serial (store): pruning trees for generations newer than 0
|
23 | 2025-03-01T00:11:53.028Z | INFO | test_instance_serial (store): pruning trees for generations older than 0
keep = 3
|
24 | 2025-03-01T00:11:53.028Z | INFO | test_instance_serial (dns): DNS server bound to address
kind = dns
local_address = [::1]:40197
|
25 | 2025-03-01T00:11:53.029Z | DEBG | test_instance_serial (http): registered endpoint
kind = dns
local_addr = [::1]:42817
method = GET
path = /config
versions = all
|
26 | 2025-03-01T00:11:53.029Z | DEBG | test_instance_serial (http): registered endpoint
kind = dns
local_addr = [::1]:42817
method = PUT
path = /config
versions = all
|
27 | 2025-03-01T00:11:53.029Z | INFO | test_instance_serial (http): listening
kind = dns
local_addr = [::1]:42817
|
28 | 2025-03-01T00:11:53.029Z | DEBG | test_instance_serial (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:42817
|
29 | 2025-03-01T00:11:53.029Z | DEBG | test_instance_serial (init_with_steps): Running step start_external_dns
|
30 | 2025-03-01T00:11:53.030Z | INFO | test_instance_serial (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpleSoB7
|
31 | 2025-03-01T00:11:53.030Z | INFO | test_instance_serial (store): pruning trees for generations newer than 0
|
32 | 2025-03-01T00:11:53.030Z | INFO | test_instance_serial (store): pruning trees for generations older than 0
keep = 3
|
33 | 2025-03-01T00:11:53.030Z | INFO | test_instance_serial (dns): DNS server bound to address
kind = dns
local_address = [::1]:50582
|
34 | 2025-03-01T00:11:53.031Z | DEBG | test_instance_serial (http): registered endpoint
kind = dns
local_addr = [::1]:44469
method = GET
path = /config
versions = all
|
35 | 2025-03-01T00:11:53.031Z | DEBG | test_instance_serial (http): registered endpoint
kind = dns
local_addr = [::1]:44469
method = PUT
path = /config
versions = all
|
36 | 2025-03-01T00:11:53.031Z | INFO | test_instance_serial (http): listening
kind = dns
local_addr = [::1]:44469
|
37 | 2025-03-01T00:11:53.031Z | DEBG | test_instance_serial (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:44469
|
38 | 2025-03-01T00:11:53.031Z | DEBG | test_instance_serial (init_with_steps): Running step start_nexus_internal
|
39 | 2025-03-01T00:11:53.031Z | DEBG | test_instance_serial: Starting Nexus (internal API)
|
40 | 2025-03-01T00:11:53.031Z | INFO | test_instance_serial: setting up nexus server
|
41 | 2025-03-01T00:11:53.031Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Action
|
42 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = AnyActor
|
43 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = AuthenticatedActor
|
44 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = BlueprintConfig
|
45 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Database
|
46 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = DnsConfig
|
47 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Fleet
|
48 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Inventory
|
49 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = IpPoolList
|
50 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = ConsoleSessionList
|
51 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = DeviceAuthRequestList
|
52 | 2025-03-01T00:11:53.032Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloCertificateList
|
53 | 2025-03-01T00:11:53.036Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloIdentityProviderList
|
54 | 2025-03-01T00:11:53.036Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloUserList
|
55 | 2025-03-01T00:11:53.036Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Project
|
56 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Disk
|
57 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Snapshot
|
58 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = ProjectImage
|
59 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Instance
|
60 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = IpPool
|
61 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = InstanceNetworkInterface
|
62 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Vpc
|
63 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = VpcRouter
|
64 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = InternetGateway
|
65 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = InternetGatewayIpPool
|
66 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = InternetGatewayIpAddress
|
67 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = RouterRoute
|
68 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = VpcSubnet
|
69 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = FloatingIp
|
70 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Image
|
71 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloImage
|
72 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = AddressLot
|
73 | 2025-03-01T00:11:53.037Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Blueprint
|
74 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = LoopbackAddress
|
75 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Certificate
|
76 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = ConsoleSession
|
77 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = DeviceAuthRequest
|
78 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = DeviceAccessToken
|
79 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = PhysicalDisk
|
80 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Rack
|
81 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = RoleBuiltin
|
82 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SshKey
|
83 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Silo
|
84 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloUser
|
85 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SiloGroup
|
86 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SupportBundle
|
87 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = IdentityProvider
|
88 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = SamlIdentityProvider
|
89 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Sled
|
90 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = TufRepo
|
91 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = TufArtifact
|
92 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Zpool
|
93 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = Service
|
94 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): registering Oso class
class = UserBuiltin
|
95 | 2025-03-01T00:11:53.038Z | INFO | test_instance_serial (ServerContext): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
96 | 2025-03-01T00:11:53.051Z | INFO | test_instance_serial (ServerContext): Setting up resolver using DNS address: [::1]:40197
|
97 | 2025-03-01T00:11:53.051Z | INFO | test_instance_serial (DnsResolver): new DNS resolver
addresses = [[::1]:40197]
|
98 | 2025-03-01T00:11:53.051Z | INFO | test_instance_serial (ServerContext): Setting up qorb database pool from a single host
url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:32871/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 32871,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n },\n}
|
99 | 2025-03-01T00:11:53.051Z | DEBG | test_instance_serial (ServerContext): registered USDT probes
|
100 | 2025-03-01T00:11:53.110Z | INFO | test_instance_serial (nexus): Database schema version is up to date
desired_version = 122.0.0
found_version = 122.0.0
|
101 | 2025-03-01T00:11:53.296Z | DEBG | test_instance_serial (clickhouse-client): registered USDT probes
id = cc344f84-7760-4d0f-a9a0-60fc66e2bb40
|
102 | 2025-03-01T00:11:53.301Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /bgtasks
versions = all
|
103 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /bgtasks/activate
versions = all
|
104 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /bgtasks/view/{bgtask_name}
versions = all
|
105 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /clickhouse/policy
versions = all
|
106 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /clickhouse/policy
versions = all
|
107 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
versions = all
|
108 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
versions = all
|
109 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
versions = all
|
110 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-finish
versions = all
|
111 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-start
versions = all
|
112 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /demo-saga
versions = all
|
113 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /demo-saga/{demo_saga_id}/complete
versions = all
|
114 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /deployment/blueprints/all
versions = all
|
115 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = DELETE
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
116 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
117 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /deployment/blueprints/import
versions = all
|
118 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /deployment/blueprints/regenerate
versions = all
|
119 | 2025-03-01T00:11:53.302Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /deployment/blueprints/target
versions = all
|
120 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /deployment/blueprints/target
versions = all
|
121 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = PUT
path = /deployment/blueprints/target/enabled
versions = all
|
122 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /disk/{disk_id}/remove-read-only-parent
versions = all
|
123 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = PUT
path = /disks/{disk_id}
versions = all
|
124 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /instances/{instance_id}/migrate
versions = all
|
125 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /metrics/collectors
versions = all
|
126 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /metrics/collectors/{collector_id}/producers
versions = all
|
127 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /metrics/producers
versions = all
|
128 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /nat/ipv4/changeset/{from_gen}
versions = all
|
129 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /physical-disk/expunge
versions = all
|
130 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /probes/{sled}
versions = all
|
131 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = PUT
path = /racks/{rack_id}/initialization-complete
versions = all
|
132 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /sagas
versions = all
|
133 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /sagas/{saga_id}
versions = all
|
134 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /sled-agents/{sled_id}
versions = all
|
135 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /sled-agents/{sled_id}
versions = all
|
136 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /sled-agents/{sled_id}/firewall-rules-update
versions = all
|
137 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /sleds/add
versions = all
|
138 | 2025-03-01T00:11:53.303Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /sleds/expunge
versions = all
|
139 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = GET
path = /sleds/uninitialized
versions = all
|
140 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = PUT
path = /switch/{switch_id}
versions = all
|
141 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = PUT
path = /vmms/{propolis_id}
versions = all
|
142 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:41715
method = POST
path = /volume/{volume_id}/remove-read-only-parent
versions = all
|
143 | 2025-03-01T00:11:53.304Z | INFO | test_instance_serial (dropshot_internal): listening
local_addr = 127.0.0.1:41715
|
144 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (dropshot_internal): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:41715
|
145 | 2025-03-01T00:11:53.304Z | INFO | test_instance_serial (SEC): SEC running
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
146 | 2025-03-01T00:11:53.304Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
147 | 2025-03-01T00:11:53.304Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
148 | 2025-03-01T00:11:53.305Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
149 | 2025-03-01T00:11:53.305Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in users
|
150 | 2025-03-01T00:11:53.307Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
151 | 2025-03-01T00:11:53.307Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
152 | 2025-03-01T00:11:53.307Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
153 | 2025-03-01T00:11:53.321Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: 7e cc 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ~............_cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:62419
req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
|
154 | 2025-03-01T00:11:53.321Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 32460,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:62419
req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
|
155 | 2025-03-01T00:11:53.323Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 32460,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
16,
95,
99,
114,
117,
99,
105,
98,
108,
101,
45,
112,
97,
110,
116,
114,
121,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:62419
req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
|
156 | 2025-03-01T00:11:53.348Z | INFO | test_instance_serial (DataLoader): created 5 built-in users
|
157 | 2025-03-01T00:11:53.350Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
158 | 2025-03-01T00:11:53.350Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
159 | 2025-03-01T00:11:53.351Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
160 | 2025-03-01T00:11:53.352Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in roles
|
161 | 2025-03-01T00:11:53.352Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
162 | 2025-03-01T00:11:53.352Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
163 | 2025-03-01T00:11:53.352Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
164 | 2025-03-01T00:11:53.388Z | INFO | test_instance_serial (DataLoader): created 10 built-in roles
|
165 | 2025-03-01T00:11:53.388Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
166 | 2025-03-01T00:11:53.388Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
167 | 2025-03-01T00:11:53.391Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
168 | 2025-03-01T00:11:53.391Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in role assignments
|
169 | 2025-03-01T00:11:53.391Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
170 | 2025-03-01T00:11:53.391Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
171 | 2025-03-01T00:11:53.392Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
172 | 2025-03-01T00:11:53.893Z | INFO | test_instance_serial (DataLoader): created 4 built-in role assignments
|
173 | 2025-03-01T00:11:53.893Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
174 | 2025-03-01T00:11:53.893Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
175 | 2025-03-01T00:11:53.896Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
176 | 2025-03-01T00:11:53.896Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in silos
|
177 | 2025-03-01T00:11:53.896Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
178 | 2025-03-01T00:11:53.897Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
179 | 2025-03-01T00:11:53.897Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
180 | 2025-03-01T00:11:54.063Z | INFO | test_instance_serial (DataLoader): created 2 built-in silos
|
181 | 2025-03-01T00:11:54.063Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
182 | 2025-03-01T00:11:54.063Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
183 | 2025-03-01T00:11:54.063Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
184 | 2025-03-01T00:11:54.096Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
185 | 2025-03-01T00:11:54.096Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
186 | 2025-03-01T00:11:54.096Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
187 | 2025-03-01T00:11:54.096Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in projects
|
188 | 2025-03-01T00:11:54.096Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
189 | 2025-03-01T00:11:54.096Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
190 | 2025-03-01T00:11:54.097Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
191 | 2025-03-01T00:11:54.100Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
192 | 2025-03-01T00:11:54.100Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
193 | 2025-03-01T00:11:54.101Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
194 | 2025-03-01T00:11:54.101Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
195 | 2025-03-01T00:11:54.102Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
196 | 2025-03-01T00:11:54.191Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
197 | 2025-03-01T00:11:54.193Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
198 | 2025-03-01T00:11:54.193Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
199 | 2025-03-01T00:11:54.193Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
200 | 2025-03-01T00:11:54.195Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
201 | 2025-03-01T00:11:54.198Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
202 | 2025-03-01T00:11:54.200Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
203 | 2025-03-01T00:11:54.200Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
204 | 2025-03-01T00:11:54.200Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
205 | 2025-03-01T00:11:54.200Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
206 | 2025-03-01T00:11:54.201Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
207 | 2025-03-01T00:11:54.215Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
208 | 2025-03-01T00:11:54.215Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
209 | 2025-03-01T00:11:54.215Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
210 | 2025-03-01T00:11:54.216Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
211 | 2025-03-01T00:11:54.218Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
212 | 2025-03-01T00:11:54.223Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
213 | 2025-03-01T00:11:54.223Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
214 | 2025-03-01T00:11:54.223Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
215 | 2025-03-01T00:11:54.224Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
216 | 2025-03-01T00:11:54.283Z | INFO | test_instance_serial (DataLoader): created built-in services project
|
217 | 2025-03-01T00:11:54.284Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
218 | 2025-03-01T00:11:54.284Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
219 | 2025-03-01T00:11:54.287Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
220 | 2025-03-01T00:11:54.287Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in VPCs
|
221 | 2025-03-01T00:11:54.287Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
222 | 2025-03-01T00:11:54.287Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
223 | 2025-03-01T00:11:54.287Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
224 | 2025-03-01T00:11:54.295Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
225 | 2025-03-01T00:11:54.295Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
226 | 2025-03-01T00:11:54.295Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
227 | 2025-03-01T00:11:54.300Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
228 | 2025-03-01T00:11:54.302Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
229 | 2025-03-01T00:11:54.302Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
230 | 2025-03-01T00:11:54.302Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
231 | 2025-03-01T00:11:54.302Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
232 | 2025-03-01T00:11:54.304Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
233 | 2025-03-01T00:11:54.304Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
234 | 2025-03-01T00:11:54.304Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
235 | 2025-03-01T00:11:54.306Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
236 | 2025-03-01T00:11:54.309Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
237 | 2025-03-01T00:11:54.310Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
238 | 2025-03-01T00:11:54.310Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
239 | 2025-03-01T00:11:54.310Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
240 | 2025-03-01T00:11:54.312Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
241 | 2025-03-01T00:11:54.320Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
242 | 2025-03-01T00:11:54.320Z | TRAC | test_instance_serial (DataLoader): successful lookup of siloed resource "Project" using built-in user
|
243 | 2025-03-01T00:11:54.320Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
244 | 2025-03-01T00:11:54.320Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
245 | 2025-03-01T00:11:54.320Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
246 | 2025-03-01T00:11:54.320Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
247 | 2025-03-01T00:11:54.320Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
248 | 2025-03-01T00:11:54.323Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
249 | 2025-03-01T00:11:54.323Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
250 | 2025-03-01T00:11:54.323Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
251 | 2025-03-01T00:11:54.324Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
252 | 2025-03-01T00:11:54.326Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
253 | 2025-03-01T00:11:54.326Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
254 | 2025-03-01T00:11:54.326Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
255 | 2025-03-01T00:11:54.327Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
256 | 2025-03-01T00:11:54.383Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
257 | 2025-03-01T00:11:54.389Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
258 | 2025-03-01T00:11:54.389Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
259 | 2025-03-01T00:11:54.389Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
260 | 2025-03-01T00:11:54.390Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
261 | 2025-03-01T00:11:54.441Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
262 | 2025-03-01T00:11:54.441Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
263 | 2025-03-01T00:11:54.441Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
264 | 2025-03-01T00:11:54.441Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
265 | 2025-03-01T00:11:54.442Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
266 | 2025-03-01T00:11:54.444Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
267 | 2025-03-01T00:11:54.444Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
268 | 2025-03-01T00:11:54.444Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
269 | 2025-03-01T00:11:54.444Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
270 | 2025-03-01T00:11:54.446Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
271 | 2025-03-01T00:11:54.446Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
272 | 2025-03-01T00:11:54.446Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
273 | 2025-03-01T00:11:54.447Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
274 | 2025-03-01T00:11:54.449Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
275 | 2025-03-01T00:11:54.459Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
276 | 2025-03-01T00:11:54.459Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
277 | 2025-03-01T00:11:54.459Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
278 | 2025-03-01T00:11:54.461Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
279 | 2025-03-01T00:11:54.500Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
280 | 2025-03-01T00:11:54.500Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
281 | 2025-03-01T00:11:54.501Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
282 | 2025-03-01T00:11:54.532Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
283 | 2025-03-01T00:11:54.533Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
284 | 2025-03-01T00:11:54.533Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
285 | 2025-03-01T00:11:54.537Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
286 | 2025-03-01T00:11:54.537Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
287 | 2025-03-01T00:11:54.537Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
288 | 2025-03-01T00:11:54.539Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
289 | 2025-03-01T00:11:54.539Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
290 | 2025-03-01T00:11:54.540Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
291 | 2025-03-01T00:11:54.540Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
292 | 2025-03-01T00:11:54.540Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
293 | 2025-03-01T00:11:54.541Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
294 | 2025-03-01T00:11:54.543Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
295 | 2025-03-01T00:11:54.543Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
296 | 2025-03-01T00:11:54.543Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
297 | 2025-03-01T00:11:54.544Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
298 | 2025-03-01T00:11:54.545Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
299 | 2025-03-01T00:11:54.553Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
300 | 2025-03-01T00:11:54.553Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
301 | 2025-03-01T00:11:54.553Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
302 | 2025-03-01T00:11:54.554Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
303 | 2025-03-01T00:11:54.616Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
304 | 2025-03-01T00:11:54.618Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
305 | 2025-03-01T00:11:54.618Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
306 | 2025-03-01T00:11:54.618Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
307 | 2025-03-01T00:11:54.618Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
308 | 2025-03-01T00:11:54.619Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
309 | 2025-03-01T00:11:54.621Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
310 | 2025-03-01T00:11:54.621Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
311 | 2025-03-01T00:11:54.621Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
312 | 2025-03-01T00:11:54.622Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
313 | 2025-03-01T00:11:54.622Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
314 | 2025-03-01T00:11:54.622Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
315 | 2025-03-01T00:11:54.622Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
316 | 2025-03-01T00:11:54.624Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
317 | 2025-03-01T00:11:54.630Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
318 | 2025-03-01T00:11:54.630Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
319 | 2025-03-01T00:11:54.631Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
320 | 2025-03-01T00:11:54.631Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
321 | 2025-03-01T00:11:54.764Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
322 | 2025-03-01T00:11:54.764Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
323 | 2025-03-01T00:11:54.765Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
324 | 2025-03-01T00:11:54.765Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
325 | 2025-03-01T00:11:54.766Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
326 | 2025-03-01T00:11:54.767Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
327 | 2025-03-01T00:11:54.767Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
328 | 2025-03-01T00:11:54.767Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
329 | 2025-03-01T00:11:54.767Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
330 | 2025-03-01T00:11:54.769Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
331 | 2025-03-01T00:11:54.769Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
332 | 2025-03-01T00:11:54.769Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
333 | 2025-03-01T00:11:54.770Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
334 | 2025-03-01T00:11:54.771Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
335 | 2025-03-01T00:11:54.779Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
336 | 2025-03-01T00:11:54.779Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
337 | 2025-03-01T00:11:54.779Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
338 | 2025-03-01T00:11:54.779Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
339 | 2025-03-01T00:11:54.798Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in VPC firewall rules
|
340 | 2025-03-01T00:11:54.798Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
341 | 2025-03-01T00:11:54.798Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
342 | 2025-03-01T00:11:54.799Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
343 | 2025-03-01T00:11:54.809Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
344 | 2025-03-01T00:11:54.809Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
345 | 2025-03-01T00:11:54.810Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
346 | 2025-03-01T00:11:54.813Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
347 | 2025-03-01T00:11:54.813Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
348 | 2025-03-01T00:11:54.814Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
349 | 2025-03-01T00:11:54.820Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
350 | 2025-03-01T00:11:54.820Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
351 | 2025-03-01T00:11:54.820Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
352 | 2025-03-01T00:11:54.820Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
353 | 2025-03-01T00:11:54.820Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
354 | 2025-03-01T00:11:54.820Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
355 | 2025-03-01T00:11:54.820Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
356 | 2025-03-01T00:11:54.820Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
357 | 2025-03-01T00:11:54.821Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
358 | 2025-03-01T00:11:54.834Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
359 | 2025-03-01T00:11:54.834Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
360 | 2025-03-01T00:11:54.835Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
361 | 2025-03-01T00:11:54.835Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
362 | 2025-03-01T00:11:54.838Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
363 | 2025-03-01T00:11:54.847Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
364 | 2025-03-01T00:11:54.848Z | TRAC | test_instance_serial (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
365 | 2025-03-01T00:11:54.848Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
366 | 2025-03-01T00:11:54.848Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
367 | 2025-03-01T00:11:54.848Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
368 | 2025-03-01T00:11:54.848Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
369 | 2025-03-01T00:11:54.848Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
370 | 2025-03-01T00:11:54.850Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
371 | 2025-03-01T00:11:54.851Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
372 | 2025-03-01T00:11:54.851Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
373 | 2025-03-01T00:11:54.855Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
374 | 2025-03-01T00:11:54.857Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
375 | 2025-03-01T00:11:54.857Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
376 | 2025-03-01T00:11:54.857Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
377 | 2025-03-01T00:11:54.859Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
378 | 2025-03-01T00:11:54.860Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
379 | 2025-03-01T00:11:54.876Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
380 | 2025-03-01T00:11:54.877Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
381 | 2025-03-01T00:11:54.877Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
382 | 2025-03-01T00:11:54.877Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
383 | 2025-03-01T00:11:54.924Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
384 | 2025-03-01T00:11:54.924Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
385 | 2025-03-01T00:11:54.924Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
386 | 2025-03-01T00:11:54.924Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
387 | 2025-03-01T00:11:54.924Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
388 | 2025-03-01T00:11:54.928Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
389 | 2025-03-01T00:11:54.928Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
390 | 2025-03-01T00:11:54.928Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
391 | 2025-03-01T00:11:54.929Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
392 | 2025-03-01T00:11:54.931Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
393 | 2025-03-01T00:11:54.932Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
394 | 2025-03-01T00:11:54.932Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
395 | 2025-03-01T00:11:54.932Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
396 | 2025-03-01T00:11:54.934Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
397 | 2025-03-01T00:11:54.942Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
398 | 2025-03-01T00:11:54.942Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
399 | 2025-03-01T00:11:54.942Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
400 | 2025-03-01T00:11:54.942Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
401 | 2025-03-01T00:11:55.066Z | INFO | test_instance_serial (DataLoader): created built-in VPC firewall rules
|
402 | 2025-03-01T00:11:55.066Z | DEBG | test_instance_serial (DataLoader): attempting to create built-in VPC Subnets
|
403 | 2025-03-01T00:11:55.066Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
404 | 2025-03-01T00:11:55.066Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
405 | 2025-03-01T00:11:55.066Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
406 | 2025-03-01T00:11:55.084Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
407 | 2025-03-01T00:11:55.084Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
408 | 2025-03-01T00:11:55.084Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
409 | 2025-03-01T00:11:55.086Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
410 | 2025-03-01T00:11:55.086Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
411 | 2025-03-01T00:11:55.086Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
412 | 2025-03-01T00:11:55.088Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
413 | 2025-03-01T00:11:55.088Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
414 | 2025-03-01T00:11:55.088Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
415 | 2025-03-01T00:11:55.088Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
416 | 2025-03-01T00:11:55.088Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
417 | 2025-03-01T00:11:55.090Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
418 | 2025-03-01T00:11:55.090Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
419 | 2025-03-01T00:11:55.090Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
420 | 2025-03-01T00:11:55.090Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
421 | 2025-03-01T00:11:55.092Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
422 | 2025-03-01T00:11:55.092Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
423 | 2025-03-01T00:11:55.092Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
424 | 2025-03-01T00:11:55.092Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
425 | 2025-03-01T00:11:55.094Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
426 | 2025-03-01T00:11:55.100Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
427 | 2025-03-01T00:11:55.100Z | TRAC | test_instance_serial (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
428 | 2025-03-01T00:11:55.100Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
429 | 2025-03-01T00:11:55.101Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
430 | 2025-03-01T00:11:55.101Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
431 | 2025-03-01T00:11:55.140Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
432 | 2025-03-01T00:11:55.141Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
433 | 2025-03-01T00:11:55.141Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
434 | 2025-03-01T00:11:55.141Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
435 | 2025-03-01T00:11:55.143Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
436 | 2025-03-01T00:11:55.146Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
437 | 2025-03-01T00:11:55.147Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
438 | 2025-03-01T00:11:55.147Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
439 | 2025-03-01T00:11:55.147Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
440 | 2025-03-01T00:11:55.149Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
441 | 2025-03-01T00:11:55.149Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
442 | 2025-03-01T00:11:55.149Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
443 | 2025-03-01T00:11:55.150Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
444 | 2025-03-01T00:11:55.153Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
445 | 2025-03-01T00:11:55.161Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
446 | 2025-03-01T00:11:55.171Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
447 | 2025-03-01T00:11:55.172Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
448 | 2025-03-01T00:11:55.172Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
449 | 2025-03-01T00:11:55.268Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
450 | 2025-03-01T00:11:55.269Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
451 | 2025-03-01T00:11:55.269Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
452 | 2025-03-01T00:11:55.277Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
453 | 2025-03-01T00:11:55.277Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
454 | 2025-03-01T00:11:55.277Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
455 | 2025-03-01T00:11:55.277Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
456 | 2025-03-01T00:11:55.277Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
457 | 2025-03-01T00:11:55.281Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
458 | 2025-03-01T00:11:55.282Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
459 | 2025-03-01T00:11:55.282Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
460 | 2025-03-01T00:11:55.282Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
461 | 2025-03-01T00:11:55.283Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
462 | 2025-03-01T00:11:55.284Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
463 | 2025-03-01T00:11:55.284Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
464 | 2025-03-01T00:11:55.284Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
465 | 2025-03-01T00:11:55.285Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
466 | 2025-03-01T00:11:55.292Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
467 | 2025-03-01T00:11:55.293Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
468 | 2025-03-01T00:11:55.294Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
469 | 2025-03-01T00:11:55.294Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
470 | 2025-03-01T00:11:55.311Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
471 | 2025-03-01T00:11:55.311Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
472 | 2025-03-01T00:11:55.311Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
473 | 2025-03-01T00:11:55.314Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
474 | 2025-03-01T00:11:55.314Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
475 | 2025-03-01T00:11:55.314Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
476 | 2025-03-01T00:11:55.314Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
477 | 2025-03-01T00:11:55.315Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
478 | 2025-03-01T00:11:55.316Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
479 | 2025-03-01T00:11:55.316Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
480 | 2025-03-01T00:11:55.316Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
481 | 2025-03-01T00:11:55.316Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
482 | 2025-03-01T00:11:55.318Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
483 | 2025-03-01T00:11:55.319Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
484 | 2025-03-01T00:11:55.319Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
485 | 2025-03-01T00:11:55.319Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
486 | 2025-03-01T00:11:55.320Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
487 | 2025-03-01T00:11:55.326Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
488 | 2025-03-01T00:11:55.348Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
489 | 2025-03-01T00:11:55.348Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
490 | 2025-03-01T00:11:55.349Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
491 | 2025-03-01T00:11:55.393Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
492 | 2025-03-01T00:11:55.393Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
493 | 2025-03-01T00:11:55.395Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
494 | 2025-03-01T00:11:55.401Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
495 | 2025-03-01T00:11:55.401Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
496 | 2025-03-01T00:11:55.401Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
497 | 2025-03-01T00:11:55.401Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
498 | 2025-03-01T00:11:55.402Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
499 | 2025-03-01T00:11:55.404Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
500 | 2025-03-01T00:11:55.404Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
501 | 2025-03-01T00:11:55.404Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
502 | 2025-03-01T00:11:55.404Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
503 | 2025-03-01T00:11:55.406Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
504 | 2025-03-01T00:11:55.407Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
505 | 2025-03-01T00:11:55.407Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
506 | 2025-03-01T00:11:55.407Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
507 | 2025-03-01T00:11:55.408Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
508 | 2025-03-01T00:11:55.416Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
509 | 2025-03-01T00:11:55.416Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
510 | 2025-03-01T00:11:55.416Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
511 | 2025-03-01T00:11:55.417Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
512 | 2025-03-01T00:11:55.432Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
513 | 2025-03-01T00:11:55.432Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
514 | 2025-03-01T00:11:55.432Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
515 | 2025-03-01T00:11:55.434Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
516 | 2025-03-01T00:11:55.436Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
517 | 2025-03-01T00:11:55.436Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
518 | 2025-03-01T00:11:55.436Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
519 | 2025-03-01T00:11:55.436Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
520 | 2025-03-01T00:11:55.436Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
521 | 2025-03-01T00:11:55.436Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
522 | 2025-03-01T00:11:55.437Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
523 | 2025-03-01T00:11:55.437Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
524 | 2025-03-01T00:11:55.438Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
525 | 2025-03-01T00:11:55.438Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
526 | 2025-03-01T00:11:55.439Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
527 | 2025-03-01T00:11:55.439Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
528 | 2025-03-01T00:11:55.440Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
529 | 2025-03-01T00:11:55.453Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
530 | 2025-03-01T00:11:55.462Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
531 | 2025-03-01T00:11:55.462Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
532 | 2025-03-01T00:11:55.462Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
533 | 2025-03-01T00:11:55.497Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
534 | 2025-03-01T00:11:55.502Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
535 | 2025-03-01T00:11:55.502Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
536 | 2025-03-01T00:11:55.506Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
537 | 2025-03-01T00:11:55.506Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
538 | 2025-03-01T00:11:55.506Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
539 | 2025-03-01T00:11:55.506Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
540 | 2025-03-01T00:11:55.507Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
541 | 2025-03-01T00:11:55.509Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
542 | 2025-03-01T00:11:55.510Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
543 | 2025-03-01T00:11:55.510Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
544 | 2025-03-01T00:11:55.510Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
545 | 2025-03-01T00:11:55.512Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
546 | 2025-03-01T00:11:55.514Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
547 | 2025-03-01T00:11:55.514Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
548 | 2025-03-01T00:11:55.514Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
549 | 2025-03-01T00:11:55.514Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
550 | 2025-03-01T00:11:55.522Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
551 | 2025-03-01T00:11:55.523Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
552 | 2025-03-01T00:11:55.523Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
553 | 2025-03-01T00:11:55.523Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
554 | 2025-03-01T00:11:55.544Z | INFO | test_instance_serial (DataLoader): created built-in services vpc subnets
|
555 | 2025-03-01T00:11:55.544Z | INFO | test_instance_serial (DataLoader): created built-in services vpc
|
556 | 2025-03-01T00:11:55.544Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
557 | 2025-03-01T00:11:55.544Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
558 | 2025-03-01T00:11:55.546Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
559 | 2025-03-01T00:11:55.546Z | DEBG | test_instance_serial (DataLoader): attempting to create silo users
|
560 | 2025-03-01T00:11:55.546Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
561 | 2025-03-01T00:11:55.546Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
562 | 2025-03-01T00:11:55.547Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
563 | 2025-03-01T00:11:55.590Z | INFO | test_instance_serial (DataLoader): created 2 silo users
|
564 | 2025-03-01T00:11:55.590Z | DEBG | test_instance_serial (DataLoader): attempting to create silo user role assignments
|
565 | 2025-03-01T00:11:55.590Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
566 | 2025-03-01T00:11:55.590Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
567 | 2025-03-01T00:11:55.591Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
568 | 2025-03-01T00:11:55.597Z | INFO | test_instance_serial (DataLoader): created 2 silo user role assignments
|
569 | 2025-03-01T00:11:55.597Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
570 | 2025-03-01T00:11:55.597Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
571 | 2025-03-01T00:11:55.599Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
572 | 2025-03-01T00:11:55.606Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
573 | 2025-03-01T00:11:55.606Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
574 | 2025-03-01T00:11:55.606Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
575 | 2025-03-01T00:11:55.627Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
|
576 | 2025-03-01T00:11:55.627Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
577 | 2025-03-01T00:11:55.627Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
578 | 2025-03-01T00:11:55.627Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
579 | 2025-03-01T00:11:55.627Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
580 | 2025-03-01T00:11:55.631Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
581 | 2025-03-01T00:11:55.636Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
result = Ok(())
|
582 | 2025-03-01T00:11:55.636Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
583 | 2025-03-01T00:11:55.636Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
584 | 2025-03-01T00:11:55.637Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
585 | 2025-03-01T00:11:55.667Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
|
586 | 2025-03-01T00:11:55.667Z | TRAC | test_instance_serial (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
587 | 2025-03-01T00:11:55.667Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
588 | 2025-03-01T00:11:55.667Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
589 | 2025-03-01T00:11:55.667Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
590 | 2025-03-01T00:11:55.673Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
591 | 2025-03-01T00:11:55.673Z | DEBG | test_instance_serial (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = IpPoolList
result = Ok(())
|
592 | 2025-03-01T00:11:55.673Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
593 | 2025-03-01T00:11:55.673Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
594 | 2025-03-01T00:11:55.673Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
595 | 2025-03-01T00:11:55.824Z | TRAC | test_instance_serial (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
|
596 | 2025-03-01T00:11:55.824Z | DEBG | test_instance_serial (DataLoader): roles
roles = RoleSet { roles: {} }
|
597 | 2025-03-01T00:11:55.825Z | DEBG | test_instance_serial (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. })
resource = Database
result = Ok(())
|
598 | 2025-03-01T00:11:55.834Z | INFO | test_instance_serial (nexus): populate complete
|
599 | 2025-03-01T00:11:55.834Z | INFO | test_instance_serial (nexus): activating background tasks
|
600 | 2025-03-01T00:11:55.834Z | DEBG | test_instance_serial (init_with_steps): Running step start_sled1
|
601 | 2025-03-01T00:11:55.834Z | INFO | test_instance_serial (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
602 | 2025-03-01T00:11:55.865Z | INFO | test_instance_serial (SledAgent): created simulated sled agent
server = b6d65341-167c-41df-9b5c-41cded99c229
sim_mode = Explicit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
603 | 2025-03-01T00:11:55.866Z | INFO | test_instance_serial (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
|
604 | 2025-03-01T00:11:55.900Z | DEBG | test_instance_serial (dropshot (Repo Depot)): registered endpoint
local_addr = [::1]:34345
method = GET
path = /artifact/sha256/{sha256}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
605 | 2025-03-01T00:11:55.900Z | INFO | test_instance_serial (dropshot (Repo Depot)): listening
local_addr = [::1]:34345
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
606 | 2025-03-01T00:11:55.901Z | DEBG | test_instance_serial (dropshot (Repo Depot)): successfully registered DTrace USDT probes
local_addr = [::1]:34345
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
607 | 2025-03-01T00:11:55.905Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /artifacts
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
608 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /artifacts/{sha256}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
609 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /artifacts/{sha256}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
610 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /artifacts/{sha256}/copy-from-depot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
611 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /boot-disk/{boot_disk}/os/write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
612 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /boot-disk/{boot_disk}/os/write/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
613 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /boot-disk/{boot_disk}/os/write/status/{update_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
614 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /bootstore/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
615 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /cockroachdb
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
616 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
617 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
618 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /disks/{disk_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
619 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /disks/{disk_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
620 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /eip-gateways
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
621 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
622 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
623 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
624 | 2025-03-01T00:11:55.906Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /omicron-physical-disks
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
625 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /omicron-physical-disks
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
626 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /omicron-zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
627 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /sled-identifiers
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
628 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /sled-role
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
629 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /sleds
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
630 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/dladm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
631 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/ipadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
632 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/pargs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
633 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/pfiles-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
634 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/pstack-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
635 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support/zoneadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
636 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
637 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
638 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
639 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
640 | 2025-03-01T00:11:55.907Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
641 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
642 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
643 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
644 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
645 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
646 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /timesync
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
647 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
648 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
649 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
650 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
651 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
652 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
653 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
654 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
655 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /vmms/{propolis_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
656 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
657 | 2025-03-01T00:11:55.908Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
658 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
659 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
660 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
661 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
662 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
663 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
664 | 2025-03-01T00:11:55.909Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /zones/bundle-cleanup
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
665 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
666 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = PUT
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
667 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
668 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones/bundles
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
669 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
670 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = POST
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
671 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
672 | 2025-03-01T00:11:55.910Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
673 | 2025-03-01T00:11:55.911Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:38105
method = GET
path = /zpools
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
674 | 2025-03-01T00:11:55.911Z | INFO | test_instance_serial (dropshot): listening
local_addr = [::1]:38105
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
675 | 2025-03-01T00:11:55.911Z | DEBG | test_instance_serial (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:38105
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
676 | 2025-03-01T00:11:55.911Z | DEBG | test_instance_serial (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
677 | 2025-03-01T00:11:55.911Z | DEBG | test_instance_serial (NexusClient): client request
body = Some(Body)
method = POST
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:41715/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
678 | 2025-03-01T00:11:55.911Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42630
|
679 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 1
reason = Timeout
|
680 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
681 | 2025-03-01T00:11:55.912Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
682 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
683 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
684 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 1
reason = Timeout
|
685 | 2025-03-01T00:11:55.912Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
686 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 1
reason = Timeout
|
687 | 2025-03-01T00:11:55.912Z | WARN | test_instance_serial (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config nor servers
|
688 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 52.521\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
689 | 2025-03-01T00:11:55.912Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 1
reason = Timeout
|
690 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
691 | 2025-03-01T00:11:55.913Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
692 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
693 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
694 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 1
reason = Timeout
|
695 | 2025-03-01T00:11:55.913Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
696 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 1
reason = Timeout
|
697 | 2025-03-01T00:11:55.913Z | WARN | test_instance_serial (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config nor servers
|
698 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 281.367\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
699 | 2025-03-01T00:11:55.913Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = metrics_producer_gc
iteration = 1
reason = Timeout
|
700 | 2025-03-01T00:11:55.914Z | INFO | test_instance_serial (BackgroundTasks): Metric producer GC running
background_task = metrics_producer_gc
expiration = 2025-03-01 00:01:55.914036999 UTC
|
701 | 2025-03-01T00:11:55.915Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = metrics_producer_gc
resource = Database
|
702 | 2025-03-01T00:11:55.915Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = metrics_producer_gc
roles = RoleSet { roles: {} }
|
703 | 2025-03-01T00:11:55.915Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = metrics_producer_gc
resource = Database
result = Ok(())
|
704 | 2025-03-01T00:11:55.915Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = external_endpoints
iteration = 1
reason = Timeout
|
705 | 2025-03-01T00:11:55.915Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
706 | 2025-03-01T00:11:55.915Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
707 | 2025-03-01T00:11:55.915Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
708 | 2025-03-01T00:11:55.915Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
709 | 2025-03-01T00:11:55.915Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
710 | 2025-03-01T00:11:55.916Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = nat_v4_garbage_collector
iteration = 1
reason = Timeout
|
711 | 2025-03-01T00:11:55.916Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = nat_v4_garbage_collector
resource = Database
|
712 | 2025-03-01T00:11:55.916Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = nat_v4_garbage_collector
roles = RoleSet { roles: {} }
|
713 | 2025-03-01T00:11:55.917Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = nat_v4_garbage_collector
resource = Database
result = Ok(())
|
714 | 2025-03-01T00:11:55.918Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = bfd_manager
iteration = 1
reason = Timeout
|
715 | 2025-03-01T00:11:55.918Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = bfd_manager
resource = Database
|
716 | 2025-03-01T00:11:55.918Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = bfd_manager
roles = RoleSet { roles: {} }
|
717 | 2025-03-01T00:11:55.918Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = bfd_manager
resource = Database
result = Ok(())
|
718 | 2025-03-01T00:11:55.918Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = phantom_disks
iteration = 1
reason = Timeout
|
719 | 2025-03-01T00:11:55.918Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 1
reason = Timeout
|
720 | 2025-03-01T00:11:55.918Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
721 | 2025-03-01T00:11:55.918Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
722 | 2025-03-01T00:11:55.918Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
|
723 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
724 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
725 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 1
reason = Timeout
|
726 | 2025-03-01T00:11:55.919Z | WARN | test_instance_serial (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = no blueprint
|
727 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 31.761\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
728 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 1
reason = Timeout
|
729 | 2025-03-01T00:11:55.919Z | WARN | test_instance_serial (BackgroundTasks): Blueprint execution: skipped
background_task = crdb_node_id_collector
reason = no blueprint
|
730 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 14.04\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
731 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = inventory_collection
iteration = 1
reason = Timeout
|
732 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
733 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
734 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
735 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
736 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
737 | 2025-03-01T00:11:55.919Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = support_bundle_collector
iteration = 1
reason = Timeout
|
738 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Fleet
|
739 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
740 | 2025-03-01T00:11:55.919Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
|
741 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
742 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
743 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 1
reason = Timeout
|
744 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 38.65\u{b5}s
iteration = 1
status = {"error":"task disabled"}
|
745 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 1
reason = Timeout
|
746 | 2025-03-01T00:11:55.920Z | WARN | test_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
747 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 25.18\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
748 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = decommissioned_disk_cleaner
iteration = 1
reason = Timeout
|
749 | 2025-03-01T00:11:55.920Z | INFO | test_instance_serial (BackgroundTasks): Decommissioned Disk Cleaner disabled
background_task = decommissioned_disk_cleaner
|
750 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = decommissioned_disk_cleaner
elapsed = 40.641\u{b5}s
iteration = 1
status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
|
751 | 2025-03-01T00:11:55.920Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = service_zone_nat_tracker
iteration = 1
reason = Timeout
|
752 | 2025-03-01T00:11:55.920Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Inventory
|
753 | 2025-03-01T00:11:55.923Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_zone_nat_tracker
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
754 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
|
755 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {} }
|
756 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
result = Ok(())
|
757 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = switch_port_config_manager
iteration = 1
reason = Timeout
|
758 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Fleet
|
759 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = switch_port_config_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
760 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
|
761 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
762 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
763 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = v2p_manager
iteration = 1
reason = Timeout
|
764 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
765 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
766 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
767 | 2025-03-01T00:11:55.924Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_replacement
iteration = 1
reason = Timeout
|
768 | 2025-03-01T00:11:55.924Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
|
769 | 2025-03-01T00:11:55.928Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
770 | 2025-03-01T00:11:55.929Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
771 | 2025-03-01T00:11:55.929Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_replacement_driver
iteration = 1
reason = Timeout
|
772 | 2025-03-01T00:11:55.930Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
|
773 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
774 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
775 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = instance_watcher
iteration = 1
reason = Timeout
|
776 | 2025-03-01T00:11:55.930Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Fleet
|
777 | 2025-03-01T00:11:55.930Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = instance_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
778 | 2025-03-01T00:11:55.930Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
|
779 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
780 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
781 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = instance_updater
iteration = 1
reason = Timeout
|
782 | 2025-03-01T00:11:55.930Z | INFO | test_instance_serial (BackgroundTasks): background instance updater explicitly disabled
background_task = instance_updater
|
783 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = instance_updater
elapsed = 65.612\u{b5}s
iteration = 1
status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
|
784 | 2025-03-01T00:11:55.930Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = instance_reincarnation
iteration = 1
reason = Timeout
|
785 | 2025-03-01T00:11:55.931Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
|
786 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
787 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
788 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = service_firewall_rule_propagation
iteration = 1
reason = Timeout
|
789 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (service-firewall-rule-progator): starting background task for service firewall rule propagation
background_task = service_firewall_rule_propagation
|
790 | 2025-03-01T00:11:55.932Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
791 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
792 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
793 | 2025-03-01T00:11:55.932Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 1
reason = Timeout
|
794 | 2025-03-01T00:11:55.935Z | INFO | test_instance_serial (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
795 | 2025-03-01T00:11:55.935Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
796 | 2025-03-01T00:11:55.935Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
797 | 2025-03-01T00:11:55.935Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
798 | 2025-03-01T00:11:55.935Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
799 | 2025-03-01T00:11:55.935Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
800 | 2025-03-01T00:11:55.935Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = abandoned_vmm_reaper
iteration = 1
reason = Timeout
|
801 | 2025-03-01T00:11:55.935Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = abandoned_vmm_reaper
resource = Database
|
802 | 2025-03-01T00:11:55.935Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = abandoned_vmm_reaper
roles = RoleSet { roles: {} }
|
803 | 2025-03-01T00:11:55.935Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = abandoned_vmm_reaper
resource = Database
result = Ok(())
|
804 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = saga_recovery
iteration = 1
reason = Timeout
|
805 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (SagaRecoverer): listing candidate sagas for recovery
|
806 | 2025-03-01T00:11:55.936Z | TRAC | test_instance_serial (SagaRecoverer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. })
resource = Database
|
807 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (SagaRecoverer): roles
roles = RoleSet { roles: {} }
|
808 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (SagaRecoverer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. })
resource = Database
result = Ok(())
|
809 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = lookup_region_port
iteration = 1
reason = Timeout
|
810 | 2025-03-01T00:11:55.936Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = lookup_region_port
resource = Database
|
811 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = lookup_region_port
roles = RoleSet { roles: {} }
|
812 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = lookup_region_port
resource = Database
result = Ok(())
|
813 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_snapshot_replacement_start
iteration = 1
reason = Timeout
|
814 | 2025-03-01T00:11:55.936Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_start
resource = Database
|
815 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
816 | 2025-03-01T00:11:55.936Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
817 | 2025-03-01T00:11:55.937Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_snapshot_replacement_garbage_collection
iteration = 1
reason = Timeout
|
818 | 2025-03-01T00:11:55.938Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
|
819 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_garbage_collection
roles = RoleSet { roles: {} }
|
820 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
result = Ok(())
|
821 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_snapshot_replacement_step
iteration = 1
reason = Timeout
|
822 | 2025-03-01T00:11:55.938Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
|
823 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
824 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
825 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = region_snapshot_replacement_finish
iteration = 1
reason = Timeout
|
826 | 2025-03-01T00:11:55.938Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_finish
resource = Database
|
827 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_finish
roles = RoleSet { roles: {} }
|
828 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_finish
resource = Database
result = Ok(())
|
829 | 2025-03-01T00:11:55.938Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = tuf_artifact_replication
iteration = 1
reason = Timeout
|
830 | 2025-03-01T00:11:55.940Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
|
831 | 2025-03-01T00:11:55.940Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
832 | 2025-03-01T00:11:55.940Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
|
833 | 2025-03-01T00:11:55.940Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
834 | 2025-03-01T00:11:55.940Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
835 | 2025-03-01T00:11:55.940Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42630
req_id = 2b7f2cb2-1602-42d4-aca6-9979a8d8d23a
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
836 | 2025-03-01T00:11:55.940Z | INFO | test_instance_serial (nexus): registered sled agent
sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
|
837 | 2025-03-01T00:11:55.940Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
838 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
839 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
840 | 2025-03-01T00:11:55.942Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
841 | 2025-03-01T00:11:55.942Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
842 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
843 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
844 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
845 | 2025-03-01T00:11:55.942Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
846 | 2025-03-01T00:11:55.942Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
847 | 2025-03-01T00:11:55.942Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 73 2a 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 s*..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:59402
req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
|
848 | 2025-03-01T00:11:55.942Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 29482,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:59402
req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
|
849 | 2025-03-01T00:11:55.942Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 29482,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_nameservice._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_nameservice._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
12,
95,
110,
97,
109,
101,
115,
101,
114,
118,
105,
99,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:59402
req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
|
850 | 2025-03-01T00:11:55.943Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 0c 98 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:56368
req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
|
851 | 2025-03-01T00:11:55.943Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3224,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:56368
req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
|
852 | 2025-03-01T00:11:55.943Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 3224,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_external-dns._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_external-dns._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
13,
95,
101,
120,
116,
101,
114,
110,
97,
108,
45,
100,
110,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:56368
req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
|
853 | 2025-03-01T00:11:55.943Z | WARN | test_instance_serial (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_internal
dns_group = internal
error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
854 | 2025-03-01T00:11:55.943Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 27.048816ms
iteration = 1
status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
855 | 2025-03-01T00:11:55.943Z | WARN | test_instance_serial (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_external
dns_group = external
error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
856 | 2025-03-01T00:11:55.943Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 25.337502ms
iteration = 1
status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
857 | 2025-03-01T00:11:55.948Z | TRAC | test_instance_serial (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
858 | 2025-03-01T00:11:55.956Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 23 f3 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 #............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:63275
req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
|
859 | 2025-03-01T00:11:55.956Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 9203,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:63275
req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
|
860 | 2025-03-01T00:11:55.957Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 9203,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:63275
req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
|
861 | 2025-03-01T00:11:55.957Z | ERRO | test_instance_serial (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_v4_garbage_collector
error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
862 | 2025-03-01T00:11:55.957Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = nat_v4_garbage_collector
elapsed = 38.24224ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
863 | 2025-03-01T00:11:55.977Z | TRAC | test_instance_serial (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
864 | 2025-03-01T00:11:56.000Z | INFO | test_instance_serial (BackgroundTasks): Metric producer GC complete (no errors)
background_task = metrics_producer_gc
expiration = 2025-03-01 00:01:55.914036999 UTC
pruned = {}
|
865 | 2025-03-01T00:11:56.000Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = metrics_producer_gc
elapsed = 64.832294ms
iteration = 1
status = {"expiration":"2025-03-01T00:01:55.914036999Z","pruned":[]}
|
866 | 2025-03-01T00:11:56.000Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: c0 86 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:52262
req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
|
867 | 2025-03-01T00:11:56.002Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 49286,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:52262
req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
|
868 | 2025-03-01T00:11:56.002Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 49286,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:52262
req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
|
869 | 2025-03-01T00:11:56.002Z | ERRO | test_instance_serial (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
870 | 2025-03-01T00:11:56.002Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = bfd_manager
elapsed = 63.110499ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
871 | 2025-03-01T00:11:56.002Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
872 | 2025-03-01T00:11:56.005Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Fleet
result = Ok(())
|
873 | 2025-03-01T00:11:56.005Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
|
874 | 2025-03-01T00:11:56.005Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
875 | 2025-03-01T00:11:56.006Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
876 | 2025-03-01T00:11:56.049Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = phantom_disks
elapsed = 130.321885ms
iteration = 1
status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
|
877 | 2025-03-01T00:11:56.050Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
878 | 2025-03-01T00:11:56.054Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
879 | 2025-03-01T00:11:56.054Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
880 | 2025-03-01T00:11:56.054Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
881 | 2025-03-01T00:11:56.055Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
882 | 2025-03-01T00:11:56.057Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
883 | 2025-03-01T00:11:56.067Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
884 | 2025-03-01T00:11:56.067Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
|
885 | 2025-03-01T00:11:56.067Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
886 | 2025-03-01T00:11:56.067Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
887 | 2025-03-01T00:11:56.106Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
888 | 2025-03-01T00:11:56.111Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
889 | 2025-03-01T00:11:56.111Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
890 | 2025-03-01T00:11:56.111Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
891 | 2025-03-01T00:11:56.112Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
892 | 2025-03-01T00:11:56.112Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
893 | 2025-03-01T00:11:56.117Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
894 | 2025-03-01T00:11:56.117Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
|
895 | 2025-03-01T00:11:56.117Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
896 | 2025-03-01T00:11:56.118Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
897 | 2025-03-01T00:11:56.118Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
898 | 2025-03-01T00:11:56.118Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
899 | 2025-03-01T00:11:56.119Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
900 | 2025-03-01T00:11:56.119Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
901 | 2025-03-01T00:11:56.123Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
902 | 2025-03-01T00:11:56.123Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
903 | 2025-03-01T00:11:56.123Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
904 | 2025-03-01T00:11:56.123Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
905 | 2025-03-01T00:11:56.123Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
906 | 2025-03-01T00:11:56.123Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
907 | 2025-03-01T00:11:56.193Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
908 | 2025-03-01T00:11:56.198Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Inventory
result = Ok(())
|
909 | 2025-03-01T00:11:56.198Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
|
910 | 2025-03-01T00:11:56.198Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_zone_nat_tracker
roles = RoleSet { roles: {} }
|
911 | 2025-03-01T00:11:56.199Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_zone_nat_tracker
resource = Database
result = Ok(())
|
912 | 2025-03-01T00:11:56.266Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = lookup_region_port
elapsed = 339.778937ms
iteration = 1
status = {"errors":[],"found_port_ok":[]}
|
913 | 2025-03-01T00:11:56.269Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
914 | 2025-03-01T00:11:56.273Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
915 | 2025-03-01T00:11:56.273Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
|
916 | 2025-03-01T00:11:56.273Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
917 | 2025-03-01T00:11:56.273Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
|
918 | 2025-03-01T00:11:56.273Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
919 | 2025-03-01T00:11:56.274Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
920 | 2025-03-01T00:11:56.275Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
921 | 2025-03-01T00:11:56.288Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Fleet
result = Ok(())
|
922 | 2025-03-01T00:11:56.288Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
|
923 | 2025-03-01T00:11:56.289Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
924 | 2025-03-01T00:11:56.289Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
925 | 2025-03-01T00:11:56.295Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
926 | 2025-03-01T00:11:56.303Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
927 | 2025-03-01T00:11:56.303Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
|
928 | 2025-03-01T00:11:56.303Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
929 | 2025-03-01T00:11:56.304Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
930 | 2025-03-01T00:11:56.342Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
931 | 2025-03-01T00:11:56.345Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
932 | 2025-03-01T00:11:56.351Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_garbage_collection
elapsed = 423.509436ms
iteration = 1
status = {"errors":[],"garbage_collect_requested":[]}
|
933 | 2025-03-01T00:11:56.351Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_finish
elapsed = 422.909739ms
iteration = 1
status = {"errors":[],"finish_invoked_ok":[]}
|
934 | 2025-03-01T00:11:56.360Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = switch_port_config_manager
elapsed = 435.492948ms
iteration = 1
status = {}
|
935 | 2025-03-01T00:11:56.360Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
|
936 | 2025-03-01T00:11:56.360Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
937 | 2025-03-01T00:11:56.360Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
938 | 2025-03-01T00:11:56.361Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
939 | 2025-03-01T00:11:56.361Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
940 | 2025-03-01T00:11:56.363Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
|
941 | 2025-03-01T00:11:56.363Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
942 | 2025-03-01T00:11:56.364Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
943 | 2025-03-01T00:11:56.372Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
|
944 | 2025-03-01T00:11:56.373Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
945 | 2025-03-01T00:11:56.373Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
946 | 2025-03-01T00:11:56.380Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_start
resource = Database
|
947 | 2025-03-01T00:11:56.380Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
948 | 2025-03-01T00:11:56.380Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
949 | 2025-03-01T00:11:56.383Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
950 | 2025-03-01T00:11:56.383Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
951 | 2025-03-01T00:11:56.389Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
952 | 2025-03-01T00:11:56.389Z | DEBG | test_instance_serial (BackgroundTasks): Found abandoned VMMs
background_task = abandoned_vmm_reaper
count = 0
total = 0
|
953 | 2025-03-01T00:11:56.389Z | INFO | test_instance_serial (BackgroundTasks): Abandoned VMMs reaped
background_task = abandoned_vmm_reaper
sled_reservations_deleted = 0
vmms_already_deleted = 0
vmms_deleted = 0
vmms_found = 0
|
954 | 2025-03-01T00:11:56.389Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = abandoned_vmm_reaper
elapsed = 459.388792ms
iteration = 1
status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
|
955 | 2025-03-01T00:11:56.395Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
956 | 2025-03-01T00:11:56.398Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
957 | 2025-03-01T00:11:56.399Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
958 | 2025-03-01T00:11:56.399Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
959 | 2025-03-01T00:11:56.399Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
960 | 2025-03-01T00:11:56.399Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
961 | 2025-03-01T00:11:56.403Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
962 | 2025-03-01T00:11:56.404Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
|
963 | 2025-03-01T00:11:56.404Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
964 | 2025-03-01T00:11:56.405Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
965 | 2025-03-01T00:11:56.418Z | INFO | test_instance_serial (SagaRecoverer): listed in-progress sagas
count = 0
|
966 | 2025-03-01T00:11:56.418Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = saga_recovery
elapsed = 491.933003ms
iteration = 1
status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
|
967 | 2025-03-01T00:11:56.418Z | WARN | test_instance_serial (BackgroundTasks): failed to read target blueprint
background_task = blueprint_loader
error = Internal Error: no target blueprint set
|
968 | 2025-03-01T00:11:56.418Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 500.327202ms
iteration = 1
status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
|
969 | 2025-03-01T00:11:56.419Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
970 | 2025-03-01T00:11:56.444Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
971 | 2025-03-01T00:11:56.445Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
972 | 2025-03-01T00:11:56.445Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
973 | 2025-03-01T00:11:56.447Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
974 | 2025-03-01T00:11:56.450Z | TRAC | test_instance_serial (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = instance failed
total_found = 0
|
975 | 2025-03-01T00:11:56.451Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
|
976 | 2025-03-01T00:11:56.451Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
977 | 2025-03-01T00:11:56.451Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
978 | 2025-03-01T00:11:56.451Z | WARN | test_instance_serial (BackgroundTasks): inventory collection is None
background_task = service_zone_nat_tracker
|
979 | 2025-03-01T00:11:56.451Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = service_zone_nat_tracker
elapsed = 531.274471ms
iteration = 1
status = {"error":"inventory collection is None"}
|
980 | 2025-03-01T00:11:56.452Z | DEBG | test_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
981 | 2025-03-01T00:11:56.452Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
982 | 2025-03-01T00:11:56.453Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: be d6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:61352
req_id = 270ad187-b2a8-4266-894b-2187c34d5818
|
983 | 2025-03-01T00:11:56.454Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 48854,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:61352
req_id = 270ad187-b2a8-4266-894b-2187c34d5818
|
984 | 2025-03-01T00:11:56.454Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 48854,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:61352
req_id = 270ad187-b2a8-4266-894b-2187c34d5818
|
985 | 2025-03-01T00:11:56.462Z | WARN | test_instance_serial (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
986 | 2025-03-01T00:11:56.463Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 543.268404ms
iteration = 1
status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
987 | 2025-03-01T00:11:56.486Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
988 | 2025-03-01T00:11:56.487Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
989 | 2025-03-01T00:11:56.487Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
990 | 2025-03-01T00:11:56.487Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
991 | 2025-03-01T00:11:56.488Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
992 | 2025-03-01T00:11:56.549Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_replacement_driver
elapsed = 626.395116ms
iteration = 1
status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
|
993 | 2025-03-01T00:11:56.550Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
|
994 | 2025-03-01T00:11:56.550Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
995 | 2025-03-01T00:11:56.551Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
996 | 2025-03-01T00:11:56.589Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_start
elapsed = 661.473142ms
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
997 | 2025-03-01T00:11:56.625Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
998 | 2025-03-01T00:11:56.625Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
999 | 2025-03-01T00:11:56.625Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1000 | 2025-03-01T00:11:56.626Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1001 | 2025-03-01T00:11:56.629Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1002 | 2025-03-01T00:11:56.629Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1003 | 2025-03-01T00:11:56.629Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1004 | 2025-03-01T00:11:56.629Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1005 | 2025-03-01T00:11:56.643Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1006 | 2025-03-01T00:11:56.644Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1007 | 2025-03-01T00:11:56.644Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
1008 | 2025-03-01T00:11:56.644Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1009 | 2025-03-01T00:11:56.644Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1010 | 2025-03-01T00:11:56.644Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1011 | 2025-03-01T00:11:56.644Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1012 | 2025-03-01T00:11:56.645Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1013 | 2025-03-01T00:11:56.656Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Fleet
|
1014 | 2025-03-01T00:11:56.657Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1015 | 2025-03-01T00:11:56.657Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
|
1016 | 2025-03-01T00:11:56.657Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
1017 | 2025-03-01T00:11:56.658Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
1018 | 2025-03-01T00:11:56.659Z | INFO | test_instance_serial (BackgroundTasks): all instance checks complete
background_task = instance_watcher
pruned_instances = 0
total_completed = 0
total_failed = 0
total_incomplete = 0
total_instances = 0
update_sagas_queued = 0
|
1019 | 2025-03-01T00:11:56.660Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = instance_watcher
elapsed = 736.625557ms
iteration = 1
status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
|
1020 | 2025-03-01T00:11:56.671Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1021 | 2025-03-01T00:11:56.672Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1022 | 2025-03-01T00:11:56.672Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1023 | 2025-03-01T00:11:56.680Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1024 | 2025-03-01T00:11:56.681Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = inventory_collection
iteration = 2
reason = Signaled
|
1025 | 2025-03-01T00:11:56.681Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
1026 | 2025-03-01T00:11:56.682Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1027 | 2025-03-01T00:11:56.682Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1028 | 2025-03-01T00:11:56.682Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1029 | 2025-03-01T00:11:56.682Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1030 | 2025-03-01T00:11:56.682Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 752187
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42630
req_id = 2b7f2cb2-1602-42d4-aca6-9979a8d8d23a
response_code = 204
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
1031 | 2025-03-01T00:11:56.683Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1032 | 2025-03-01T00:11:56.687Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
1033 | 2025-03-01T00:11:56.687Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
|
1034 | 2025-03-01T00:11:56.687Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
1035 | 2025-03-01T00:11:56.688Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
1036 | 2025-03-01T00:11:56.689Z | DEBG | test_instance_serial (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:41715/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "2b7f2cb2-1602-42d4-aca6-9979a8d8d23a", "date": "Sat, 01 Mar 2025 00:11:55 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1037 | 2025-03-01T00:11:56.689Z | DEBG | test_instance_serial (init_with_steps): Running step start_crucible_pantry
|
1038 | 2025-03-01T00:11:56.690Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = GET
path = /crucible/pantry/0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1039 | 2025-03-01T00:11:56.690Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = GET
path = /crucible/pantry/0/job/{id}/is-finished
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1040 | 2025-03-01T00:11:56.691Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = GET
path = /crucible/pantry/0/job/{id}/ok
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1041 | 2025-03-01T00:11:56.691Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = DELETE
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1042 | 2025-03-01T00:11:56.691Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = GET
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1043 | 2025-03-01T00:11:56.691Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1044 | 2025-03-01T00:11:56.691Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}/background
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1045 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}/bulk-write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1046 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}/import-from-url
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1047 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}/scrub
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1048 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:34655
method = POST
path = /crucible/pantry/0/volume/{id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
1049 | 2025-03-01T00:11:56.692Z | INFO | test_instance_serial (dropshot): listening
kind = pantry
local_addr = [::1]:34655
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1050 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (dropshot): successfully registered DTrace USDT probes
kind = pantry
local_addr = [::1]:34655
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1051 | 2025-03-01T00:11:56.692Z | INFO | test_instance_serial (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry
address = [::1]:34655
kind = pantry
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1052 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial (init_with_steps): Running step populate_internal_dns
|
1053 | 2025-03-01T00:11:56.692Z | DEBG | test_instance_serial: Populating Internal DNS
|
1054 | 2025-03-01T00:11:56.788Z | INFO | test_instance_serial: DNS population: DnsConfigParams {
generation: Generation(
1,
),
time_created: 2025-03-01T00:11:56.788510876Z,
zones: [
DnsConfigZone {
zone_name: "control-plane.oxide.internal",
records: {
"_crucible-pantry._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 34655,
target: "758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal",
},
),
],
"56963668-32be-40a0-9656-db179a86c4fe.host": [
Aaaa(
::1,
),
],
"_nameservice._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 42817,
target: "56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal",
},
),
],
"758d4c62-f125-45a8-83d6-22953d8c0fe0.host": [
Aaaa(
::1,
),
],
"_clickhouse-native._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "62a82046-a0ff-4d2a-9030-bca63f3c93d9.host.control-plane.oxide.internal",
},
),
],
"91c88d5e-9918-41b7-9c23-bbba4cab0734.host": [
Aaaa(
::1,
),
],
"_external-dns._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 44469,
target: "4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal",
},
),
],
"62a82046-a0ff-4d2a-9030-bca63f3c93d9.host": [
Aaaa(
::1,
),
],
"_nexus._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 41715,
target: "07ece834-ed97-4e95-ace6-eee27c1e42f0.host.control-plane.oxide.internal",
},
),
],
"4a162527-5074-4520-add9-9cf6820a1f4a.host": [
Aaaa(
::1,
),
],
"_mgd._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 43963,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"_mgs._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 39563,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"_dendrite._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 42103,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"07ece834-ed97-4e95-ace6-eee27c1e42f0.host": [
Aaaa(
::ffff:127.0.0.1,
),
],
"_clickhouse._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 44431,
target: "62a82046-a0ff-4d2a-9030-bca63f3c93d9.host.control-plane.oxide.internal",
},
),
],
"_cockroach._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 32871,
target: "91c88d5e-9918-41b7-9c23-bbba4cab0734.host.control-plane.oxide.internal",
},
),
],
"dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [
Aaaa(
::1,
),
],
},
},
],
}
|
1055 | 2025-03-01T00:11:56.789Z | DEBG | test_instance_serial: client request
body = Some(Body)
method = PUT
uri = http://[::1]:42817/config
|
1056 | 2025-03-01T00:11:56.790Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1057 | 2025-03-01T00:11:56.794Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1058 | 2025-03-01T00:11:56.794Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1059 | 2025-03-01T00:11:56.794Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1060 | 2025-03-01T00:11:56.795Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1061 | 2025-03-01T00:11:56.798Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1062 | 2025-03-01T00:11:56.798Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1063 | 2025-03-01T00:11:56.798Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1064 | 2025-03-01T00:11:56.798Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1065 | 2025-03-01T00:11:56.799Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_replacement
elapsed = 876.678346ms
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
1066 | 2025-03-01T00:11:56.799Z | WARN | test_instance_serial (BackgroundTasks): failed to read DNS config
background_task = dns_config_internal
dns_group = internal
error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
|
1067 | 2025-03-01T00:11:56.800Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 889.847149ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
|
1068 | 2025-03-01T00:11:56.800Z | WARN | test_instance_serial (BackgroundTasks): failed to read DNS config
background_task = dns_config_external
dns_group = external
error = Internal Error: expected exactly one latest version for DNS group External, found 0
|
1069 | 2025-03-01T00:11:56.800Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 887.761474ms
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
|
1070 | 2025-03-01T00:11:56.800Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_step
elapsed = 871.281054ms
iteration = 1
status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
|
1071 | 2025-03-01T00:11:56.800Z | WARN | test_instance_serial (BackgroundTasks): failed to read Silo/DNS/TLS configuration
background_task = external_endpoints
error = Internal Error: expected at least one external DNS zone
|
1072 | 2025-03-01T00:11:56.800Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 885.036703ms
iteration = 1
status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
|
1073 | 2025-03-01T00:11:56.865Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
|
1074 | 2025-03-01T00:11:56.865Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1075 | 2025-03-01T00:11:56.865Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
|
1076 | 2025-03-01T00:11:56.865Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
1077 | 2025-03-01T00:11:56.866Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
1078 | 2025-03-01T00:11:56.942Z | INFO | test_instance_serial (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
1079 | 2025-03-01T00:11:56.943Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:38105/vpc-routes
|
1080 | 2025-03-01T00:11:56.943Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1081 | 2025-03-01T00:11:56.943Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1082 | 2025-03-01T00:11:56.944Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1083 | 2025-03-01T00:11:56.945Z | TRAC | test_instance_serial (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = start saga failed
total_found = 0
|
1084 | 2025-03-01T00:11:56.946Z | WARN | test_instance_serial (BackgroundTasks): instance reincarnation completed with errors
background_task = instance_reincarnation
instances_changed_state = 0
instances_found = 0
instances_reincarnated = 0
query_errors = 0
restart_errors = 0
|
1085 | 2025-03-01T00:11:56.946Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = instance_reincarnation
elapsed = 1.021826658s
iteration = 1
status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
|
1086 | 2025-03-01T00:11:56.946Z | INFO | test_instance_serial (http): accepted connection
kind = dns
local_addr = [::1]:42817
remote_addr = [::1]:42948
|
1087 | 2025-03-01T00:11:56.946Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50024
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1088 | 2025-03-01T00:11:56.947Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50024
req_id = 380dbb30-a387-476b-9df5-d44fdcf9ca32
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
1089 | 2025-03-01T00:11:56.948Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 659
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50024
req_id = 380dbb30-a387-476b-9df5-d44fdcf9ca32
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
1090 | 2025-03-01T00:11:56.948Z | TRAC | test_instance_serial (http): incoming request
kind = dns
local_addr = [::1]:42817
method = PUT
remote_addr = [::1]:42948
req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
uri = /config
|
1091 | 2025-03-01T00:11:56.949Z | INFO | test_instance_serial (store): attempting generation update
new_generation = 1
req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
|
1092 | 2025-03-01T00:11:56.949Z | INFO | test_instance_serial (store): pruning trees for generations newer than 0
|
1093 | 2025-03-01T00:11:56.949Z | DEBG | test_instance_serial (store): creating tree
tree_name = generation_1_zone_control-plane.oxide.internal
|
1094 | 2025-03-01T00:11:56.950Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "380dbb30-a387-476b-9df5-d44fdcf9ca32", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1095 | 2025-03-01T00:11:56.951Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
1096 | 2025-03-01T00:11:56.951Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
1097 | 2025-03-01T00:11:56.952Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
1098 | 2025-03-01T00:11:56.955Z | DEBG | test_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
1099 | 2025-03-01T00:11:56.955Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
1100 | 2025-03-01T00:11:56.957Z | DEBG | test_instance_serial (store): updating current config
|
1101 | 2025-03-01T00:11:56.958Z | DEBG | test_instance_serial (store): flushing default tree
|
1102 | 2025-03-01T00:11:56.959Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1103 | 2025-03-01T00:11:56.978Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1104 | 2025-03-01T00:11:56.978Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1105 | 2025-03-01T00:11:56.978Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1106 | 2025-03-01T00:11:56.979Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1107 | 2025-03-01T00:11:56.980Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1108 | 2025-03-01T00:11:56.984Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
1109 | 2025-03-01T00:11:56.984Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
|
1110 | 2025-03-01T00:11:56.984Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
1111 | 2025-03-01T00:11:56.985Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
1112 | 2025-03-01T00:11:56.988Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1113 | 2025-03-01T00:11:56.988Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1114 | 2025-03-01T00:11:56.991Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1115 | 2025-03-01T00:11:56.993Z | INFO | test_instance_serial (store): pruning trees for generations older than 1
keep = 3
|
1116 | 2025-03-01T00:11:56.994Z | INFO | test_instance_serial (store): updated generation
new_generation = 1
req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
|
1117 | 2025-03-01T00:11:56.994Z | INFO | test_instance_serial (http): request completed
kind = dns
latency_us = 45056
local_addr = [::1]:42817
method = PUT
remote_addr = [::1]:42948
req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
response_code = 204
uri = /config
|
1118 | 2025-03-01T00:11:57.028Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 03 d1 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:63540
req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
|
1119 | 2025-03-01T00:11:57.028Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 977,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:63540
req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
|
1120 | 2025-03-01T00:11:57.029Z | DEBG | test_instance_serial (store): query key
key = _mgs._tcp
|
1121 | 2025-03-01T00:11:57.029Z | DEBG | test_instance_serial (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
1122 | 2025-03-01T00:11:57.029Z | DEBG | test_instance_serial (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:63540
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }]
req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
|
1123 | 2025-03-01T00:11:57.030Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1124 | 2025-03-01T00:11:57.030Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1125 | 2025-03-01T00:11:57.042Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1126 | 2025-03-01T00:11:57.043Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
body = None
method = GET
uri = http://[::1]:38105/artifacts
|
1127 | 2025-03-01T00:11:57.043Z | DEBG | test_instance_serial: client response
result = Ok(Response { url: "http://[::1]:42817/config", status: 204, headers: {"x-request-id": "5ea9c566-f7f0-4fb4-886c-109eb79b83d5", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1128 | 2025-03-01T00:11:57.046Z | DEBG | test_instance_serial (init_with_steps): Running step configure_sled_agents
|
1129 | 2025-03-01T00:11:57.090Z | DEBG | test_instance_serial: client request
body = Some(Body)
method = PUT
uri = http://[::1]:38105/omicron-zones
|
1130 | 2025-03-01T00:11:57.098Z | DEBG | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1986, tv_nsec: 858371676 } })
|
1131 | 2025-03-01T00:11:57.099Z | TRAC | test_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
|
1132 | 2025-03-01T00:11:57.106Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50026
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1133 | 2025-03-01T00:11:57.107Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50028
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1134 | 2025-03-01T00:11:57.109Z | INFO | test_instance_serial (BackgroundTasks): No bundles to collect
background_task = support_bundle_collector
|
1135 | 2025-03-01T00:11:57.109Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = support_bundle_collector
elapsed = 1.189514859s
iteration = 1
status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
|
1136 | 2025-03-01T00:11:57.111Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50026
req_id = e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts
|
1137 | 2025-03-01T00:11:57.117Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1138 | 2025-03-01T00:11:57.117Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1139 | 2025-03-01T00:11:57.118Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1140 | 2025-03-01T00:11:57.125Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 14793
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50026
req_id = e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts
|
1141 | 2025-03-01T00:11:57.126Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 1a f3 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:50244
req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
|
1142 | 2025-03-01T00:11:57.127Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 6899,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:50244
req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
|
1143 | 2025-03-01T00:11:57.128Z | DEBG | test_instance_serial (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
1144 | 2025-03-01T00:11:57.128Z | DEBG | test_instance_serial (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:50244
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
|
1145 | 2025-03-01T00:11:57.128Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
result = Ok(Response { url: "http://[::1]:38105/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1146 | 2025-03-01T00:11:57.128Z | INFO | test_instance_serial (BackgroundTasks): Successfully got artifact list
background_task = tuf_artifact_replication
sled = http://[::1]:38105
|
1147 | 2025-03-01T00:11:57.147Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = tuf_artifact_replication
elapsed = 1.216824492s
iteration = 1
status = {"last_run_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2025-03-01T00:11:57.127472252Z"}]}
|
1148 | 2025-03-01T00:11:57.152Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50028
req_id = 9085a0b2-796c-4113-8d7c-b9d0ef2cde50
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
1149 | 2025-03-01T00:11:57.223Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
1150 | 2025-03-01T00:11:57.229Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 75881
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50028
req_id = 9085a0b2-796c-4113-8d7c-b9d0ef2cde50
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-zones
|
1151 | 2025-03-01T00:11:57.233Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1152 | 2025-03-01T00:11:57.234Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1153 | 2025-03-01T00:11:57.234Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1154 | 2025-03-01T00:11:57.234Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1155 | 2025-03-01T00:11:57.234Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1156 | 2025-03-01T00:11:57.234Z | INFO | test_instance_serial (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = sim-b6d65341
|
1157 | 2025-03-01T00:11:57.234Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:38105/eip-gateways
|
1158 | 2025-03-01T00:11:57.235Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50024
req_id = 42d00952-dc44-4bf7-aea5-4d7099ddda23
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
1159 | 2025-03-01T00:11:57.235Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 203
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50024
req_id = 42d00952-dc44-4bf7-aea5-4d7099ddda23
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
1160 | 2025-03-01T00:11:57.235Z | DEBG | test_instance_serial: client response
result = Ok(Response { url: "http://[::1]:38105/omicron-zones", status: 204, headers: {"x-request-id": "9085a0b2-796c-4113-8d7c-b9d0ef2cde50", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1161 | 2025-03-01T00:11:57.235Z | DEBG | test_instance_serial: client request
body = Some(Body)
method = PUT
uri = http://[::1]:38105/network-bootstore-config
|
1162 | 2025-03-01T00:11:57.235Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 76 1a 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c v............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:61195
req_id = cfd9823e-3086-4f68-b659-b27c39468a18
|
1163 | 2025-03-01T00:11:57.235Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 30234,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:61195
req_id = cfd9823e-3086-4f68-b659-b27c39468a18
|
1164 | 2025-03-01T00:11:57.235Z | DEBG | test_instance_serial (store): query key
key = _clickhouse-admin-keeper._tcp
|
1165 | 2025-03-01T00:11:57.235Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 30234,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:61195
req_id = cfd9823e-3086-4f68-b659-b27c39468a18
|
1166 | 2025-03-01T00:11:57.237Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:38105/eip-gateways", status: 204, headers: {"x-request-id": "42d00952-dc44-4bf7-aea5-4d7099ddda23", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1167 | 2025-03-01T00:11:57.238Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 1.313244621s
iteration = 1
status = {}
|
1168 | 2025-03-01T00:11:57.239Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1169 | 2025-03-01T00:11:57.239Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1170 | 2025-03-01T00:11:57.239Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1171 | 2025-03-01T00:11:57.240Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1172 | 2025-03-01T00:11:57.240Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50028
req_id = 19a69930-6fc6-42b0-9100-afe48c243447
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
1173 | 2025-03-01T00:11:57.240Z | DEBG | test_instance_serial (BackgroundTasks): begin collection
background_task = inventory_collection
|
1174 | 2025-03-01T00:11:57.246Z | DEBG | test_instance_serial (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:39563
|
1175 | 2025-03-01T00:11:57.246Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/ignition
|
1176 | 2025-03-01T00:11:57.247Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 1199
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50028
req_id = 19a69930-6fc6-42b0-9100-afe48c243447
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
1177 | 2025-03-01T00:11:57.280Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1178 | 2025-03-01T00:11:57.280Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1179 | 2025-03-01T00:11:57.281Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1180 | 2025-03-01T00:11:57.281Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1181 | 2025-03-01T00:11:57.281Z | DEBG | test_instance_serial: client response
result = Ok(Response { url: "http://[::1]:38105/network-bootstore-config", status: 204, headers: {"x-request-id": "19a69930-6fc6-42b0-9100-afe48c243447", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
|
1182 | 2025-03-01T00:11:57.282Z | DEBG | test_instance_serial (init_with_steps): Running step start_nexus_external
|
1183 | 2025-03-01T00:11:57.282Z | DEBG | test_instance_serial: Starting Nexus (external API)
|
1184 | 2025-03-01T00:11:58.373Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1185 | 2025-03-01T00:11:58.373Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1186 | 2025-03-01T00:11:58.373Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1187 | 2025-03-01T00:11:58.373Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1188 | 2025-03-01T00:11:58.374Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1189 | 2025-03-01T00:11:58.375Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
1190 | 2025-03-01T00:11:58.376Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1191 | 2025-03-01T00:11:58.376Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1192 | 2025-03-01T00:11:58.376Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1193 | 2025-03-01T00:11:58.377Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1194 | 2025-03-01T00:11:58.378Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1195 | 2025-03-01T00:11:58.385Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1196 | 2025-03-01T00:11:58.386Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
1197 | 2025-03-01T00:11:58.386Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1198 | 2025-03-01T00:11:58.386Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1199 | 2025-03-01T00:11:58.386Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1200 | 2025-03-01T00:11:58.389Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1201 | 2025-03-01T00:11:58.393Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
1202 | 2025-03-01T00:11:58.394Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
1203 | 2025-03-01T00:11:58.394Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1204 | 2025-03-01T00:11:58.394Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1205 | 2025-03-01T00:11:58.394Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1206 | 2025-03-01T00:11:58.395Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1207 | 2025-03-01T00:11:58.395Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1208 | 2025-03-01T00:11:58.395Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1209 | 2025-03-01T00:11:58.396Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1210 | 2025-03-01T00:11:58.396Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1211 | 2025-03-01T00:11:58.399Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1212 | 2025-03-01T00:11:58.399Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1213 | 2025-03-01T00:11:58.399Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1214 | 2025-03-01T00:11:58.400Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1215 | 2025-03-01T00:11:58.401Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1216 | 2025-03-01T00:11:58.405Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
1217 | 2025-03-01T00:11:58.405Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
1218 | 2025-03-01T00:11:58.405Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
1219 | 2025-03-01T00:11:58.406Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
1220 | 2025-03-01T00:11:58.409Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "99f5e0b1-d662-42d6-97d0-a045bce4d4f0", "content-length": "835", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1221 | 2025-03-01T00:11:58.410Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0
|
1222 | 2025-03-01T00:11:58.411Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1223 | 2025-03-01T00:11:58.411Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1224 | 2025-03-01T00:11:58.411Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1225 | 2025-03-01T00:11:58.417Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1226 | 2025-03-01T00:11:58.417Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1227 | 2025-03-01T00:11:58.418Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1228 | 2025-03-01T00:11:58.419Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1229 | 2025-03-01T00:11:58.419Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1230 | 2025-03-01T00:11:58.420Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1231 | 2025-03-01T00:11:58.431Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ef37165-949e-44d3-96dd-e63c2c4b3c41", "content-length": "734", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1232 | 2025-03-01T00:11:58.431Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0
|
1233 | 2025-03-01T00:11:58.432Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1234 | 2025-03-01T00:11:58.432Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1235 | 2025-03-01T00:11:58.432Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1236 | 2025-03-01T00:11:58.432Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1237 | 2025-03-01T00:11:58.433Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1238 | 2025-03-01T00:11:58.435Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1239 | 2025-03-01T00:11:58.436Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1240 | 2025-03-01T00:11:58.436Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1241 | 2025-03-01T00:11:58.436Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1242 | 2025-03-01T00:11:58.442Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1243 | 2025-03-01T00:11:58.442Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1244 | 2025-03-01T00:11:58.443Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1245 | 2025-03-01T00:11:58.443Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1246 | 2025-03-01T00:11:58.444Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1247 | 2025-03-01T00:11:58.456Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1248 | 2025-03-01T00:11:58.457Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
1249 | 2025-03-01T00:11:58.457Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1250 | 2025-03-01T00:11:58.457Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1251 | 2025-03-01T00:11:58.458Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1252 | 2025-03-01T00:11:58.458Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1253 | 2025-03-01T00:11:58.458Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1254 | 2025-03-01T00:11:58.464Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1255 | 2025-03-01T00:11:58.464Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1256 | 2025-03-01T00:11:58.464Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1257 | 2025-03-01T00:11:58.465Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1258 | 2025-03-01T00:11:58.467Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1259 | 2025-03-01T00:11:58.467Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1260 | 2025-03-01T00:11:58.468Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1261 | 2025-03-01T00:11:58.468Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1262 | 2025-03-01T00:11:58.469Z | INFO | test_instance_serial (InternalApi): set cockroachdb setting
setting = cluster.preserve_downgrade_option
value = 22.1
|
1263 | 2025-03-01T00:11:58.470Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1264 | 2025-03-01T00:11:58.470Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1265 | 2025-03-01T00:11:58.470Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1266 | 2025-03-01T00:11:58.472Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1267 | 2025-03-01T00:11:58.481Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1268 | 2025-03-01T00:11:58.481Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1269 | 2025-03-01T00:11:58.481Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1270 | 2025-03-01T00:11:58.482Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1271 | 2025-03-01T00:11:58.488Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
1272 | 2025-03-01T00:11:58.488Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1273 | 2025-03-01T00:11:58.488Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1274 | 2025-03-01T00:11:58.489Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1275 | 2025-03-01T00:11:58.489Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1276 | 2025-03-01T00:11:58.507Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1277 | 2025-03-01T00:11:58.512Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
1278 | 2025-03-01T00:11:58.512Z | DEBG | test_instance_serial (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some(
V6(
Ipv6Network {
addr: fd00:1122:3344:100::,
prefix: 56,
},
),
)
|
1279 | 2025-03-01T00:11:58.512Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1280 | 2025-03-01T00:11:58.512Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1281 | 2025-03-01T00:11:58.516Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1282 | 2025-03-01T00:11:58.519Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1283 | 2025-03-01T00:11:58.519Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1284 | 2025-03-01T00:11:58.519Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1285 | 2025-03-01T00:11:58.519Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0c42b548-d2ca-485f-8dcd-06f47805fca3", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1286 | 2025-03-01T00:11:58.519Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1
|
1287 | 2025-03-01T00:11:58.522Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f213be0a-bae3-4fdf-b366-dce678e64369", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1288 | 2025-03-01T00:11:58.522Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0
|
1289 | 2025-03-01T00:11:58.524Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f58e865a-4378-41c5-b0d9-1b281705fe46", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1290 | 2025-03-01T00:11:58.524Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1
|
1291 | 2025-03-01T00:11:58.529Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1292 | 2025-03-01T00:11:58.529Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1293 | 2025-03-01T00:11:58.535Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1294 | 2025-03-01T00:11:58.536Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "946ae855-ab11-48c0-a3e3-760c2cdde688", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1295 | 2025-03-01T00:11:58.536Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
1296 | 2025-03-01T00:11:58.537Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9cb1af1-f9e6-479f-80eb-007b94ff3d61", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1297 | 2025-03-01T00:11:58.540Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
1298 | 2025-03-01T00:11:58.540Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2b4d8fe-c2b5-40b1-8c4c-251429f4b453", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1299 | 2025-03-01T00:11:58.540Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cmpa
|
1300 | 2025-03-01T00:11:58.540Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1301 | 2025-03-01T00:11:58.540Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1302 | 2025-03-01T00:11:58.540Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1303 | 2025-03-01T00:11:58.544Z | INFO | test_instance_serial (InternalApi): Using static configuration for external switchports
|
1304 | 2025-03-01T00:11:58.545Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1305 | 2025-03-01T00:11:58.545Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1306 | 2025-03-01T00:11:58.545Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1307 | 2025-03-01T00:11:58.545Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c114f0ac-da79-4274-9979-31c681deb2db", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1308 | 2025-03-01T00:11:58.557Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
1309 | 2025-03-01T00:11:58.557Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1310 | 2025-03-01T00:11:58.558Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1311 | 2025-03-01T00:11:58.558Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1312 | 2025-03-01T00:11:58.559Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "03124240-d149-4e7d-a9ca-b89f38ff157c", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1313 | 2025-03-01T00:11:58.560Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
1314 | 2025-03-01T00:11:58.561Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d884f582-dc57-44f2-983a-fc4490ae93fa", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1315 | 2025-03-01T00:11:58.561Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
1316 | 2025-03-01T00:11:58.562Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5b630d81-c70e-4d11-890b-bddb7036f7a8", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1317 | 2025-03-01T00:11:58.563Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1
|
1318 | 2025-03-01T00:11:58.563Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1319 | 2025-03-01T00:11:58.564Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1320 | 2025-03-01T00:11:58.564Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1321 | 2025-03-01T00:11:58.564Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1322 | 2025-03-01T00:11:58.564Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1323 | 2025-03-01T00:11:58.564Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "75dd8c57-8f2b-4193-8a86-1f53e9ddd94f", "content-length": "734", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1324 | 2025-03-01T00:11:58.564Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0
|
1325 | 2025-03-01T00:11:58.565Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1326 | 2025-03-01T00:11:58.565Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1327 | 2025-03-01T00:11:58.565Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1328 | 2025-03-01T00:11:58.565Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1329 | 2025-03-01T00:11:58.567Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2ddf0509-1d05-4639-a964-611e5c236bea", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1330 | 2025-03-01T00:11:58.567Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1
|
1331 | 2025-03-01T00:11:58.569Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1332 | 2025-03-01T00:11:58.570Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1333 | 2025-03-01T00:11:58.570Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1334 | 2025-03-01T00:11:58.570Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1335 | 2025-03-01T00:11:58.578Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fea1fec9-ee3c-4488-85c0-0c22af551383", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1336 | 2025-03-01T00:11:58.579Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0
|
1337 | 2025-03-01T00:11:58.579Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1338 | 2025-03-01T00:11:58.588Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1339 | 2025-03-01T00:11:58.588Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
1340 | 2025-03-01T00:11:58.588Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1341 | 2025-03-01T00:11:58.588Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1342 | 2025-03-01T00:11:58.589Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1343 | 2025-03-01T00:11:58.589Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1344 | 2025-03-01T00:11:58.589Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1345 | 2025-03-01T00:11:58.591Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1346 | 2025-03-01T00:11:58.591Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1347 | 2025-03-01T00:11:58.592Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1348 | 2025-03-01T00:11:58.593Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1349 | 2025-03-01T00:11:58.594Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f4f0411-4aeb-4ede-8ccc-10a33457e546", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1350 | 2025-03-01T00:11:58.595Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1
|
1351 | 2025-03-01T00:11:58.595Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1352 | 2025-03-01T00:11:58.595Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1353 | 2025-03-01T00:11:58.595Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1354 | 2025-03-01T00:11:58.598Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1355 | 2025-03-01T00:11:58.676Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:38105/v2p
|
1356 | 2025-03-01T00:11:58.677Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1357 | 2025-03-01T00:11:58.694Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1358 | 2025-03-01T00:11:58.694Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1359 | 2025-03-01T00:11:58.694Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1360 | 2025-03-01T00:11:58.696Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1361 | 2025-03-01T00:11:58.697Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50030
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1362 | 2025-03-01T00:11:58.698Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50030
req_id = 0d149630-dfcd-4e88-8e35-ad0ce937f6e1
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
1363 | 2025-03-01T00:11:58.698Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 318
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50030
req_id = 0d149630-dfcd-4e88-8e35-ad0ce937f6e1
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
1364 | 2025-03-01T00:11:58.698Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:38105/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d149630-dfcd-4e88-8e35-ad0ce937f6e1", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1365 | 2025-03-01T00:11:58.699Z | INFO | test_instance_serial (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-b6d65341
|
1366 | 2025-03-01T00:11:58.699Z | INFO | test_instance_serial (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
1367 | 2025-03-01T00:11:58.699Z | INFO | test_instance_serial (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
1368 | 2025-03-01T00:11:58.700Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 2.778563936s
iteration = 1
status = {}
|
1369 | 2025-03-01T00:11:58.703Z | INFO | test_instance_serial (InternalApi): Recording Rack Network Configuration
|
1370 | 2025-03-01T00:11:58.705Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1371 | 2025-03-01T00:11:58.705Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1372 | 2025-03-01T00:11:58.705Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1373 | 2025-03-01T00:11:58.706Z | DEBG | test_instance_serial (service-firewall-rule-progator): resolved names for firewall rules
background_task = service_firewall_rule_propagation
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
1374 | 2025-03-01T00:11:58.706Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Fleet
|
1375 | 2025-03-01T00:11:58.706Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1376 | 2025-03-01T00:11:58.706Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1377 | 2025-03-01T00:11:58.707Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1378 | 2025-03-01T00:11:58.707Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1379 | 2025-03-01T00:11:58.710Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1380 | 2025-03-01T00:11:58.715Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Fleet
result = Ok(())
|
1381 | 2025-03-01T00:11:58.721Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
|
1382 | 2025-03-01T00:11:58.721Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
1383 | 2025-03-01T00:11:58.721Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
1384 | 2025-03-01T00:11:58.727Z | TRAC | test_instance_serial (service-firewall-rule-progator): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-02-28T23:51:58.927566Z, allowed_ips: None }
background_task = service_firewall_rule_propagation
|
1385 | 2025-03-01T00:11:58.727Z | DEBG | test_instance_serial (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
background_task = service_firewall_rule_propagation
|
1386 | 2025-03-01T00:11:58.727Z | DEBG | test_instance_serial (service-firewall-rule-progator): resolved firewall rules for sled agents
background_task = service_firewall_rule_propagation
sled_agent_rules = []
|
1387 | 2025-03-01T00:11:58.727Z | DEBG | test_instance_serial (service-firewall-rule-progator): resolved 0 rules for sleds
background_task = service_firewall_rule_propagation
|
1388 | 2025-03-01T00:11:58.754Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3c71ae1-63fc-436b-893b-df2ae768b38a", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1389 | 2025-03-01T00:11:58.756Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
1390 | 2025-03-01T00:11:58.772Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4ceba6f4-dbc1-40b9-9e13-8aadfc9d9b90", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1391 | 2025-03-01T00:11:58.773Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
1392 | 2025-03-01T00:11:58.773Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8e8819e7-3d80-45c4-96fc-22b6b2a7ed23", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1393 | 2025-03-01T00:11:58.774Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cmpa
|
1394 | 2025-03-01T00:11:58.784Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6088745d-ad7f-48d7-b46c-39d965056bb2", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1395 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
1396 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "46e19603-ccf3-4c12-b63a-9a2939439a87", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1397 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
1398 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ce7409bb-9c48-40b0-bb8e-7d0644ce2b87", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1399 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
1400 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff4f436d-d2fb-4093-8006-7e72edf40000", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1401 | 2025-03-01T00:11:58.785Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0
|
1402 | 2025-03-01T00:11:58.786Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4c9b365d-7a16-49a3-8c4e-4230dc9f3775", "content-length": "723", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1403 | 2025-03-01T00:11:58.792Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0
|
1404 | 2025-03-01T00:11:58.792Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1555431e-f180-48eb-a7d4-abe1f7acb04c", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1405 | 2025-03-01T00:11:58.792Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1
|
1406 | 2025-03-01T00:11:58.792Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "27f3b9b9-4024-4ff2-a88a-932533fbc74e", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1407 | 2025-03-01T00:11:58.792Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0
|
1408 | 2025-03-01T00:11:58.793Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "736032b3-a44b-4bae-9e7a-b11c92ef3f51", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1409 | 2025-03-01T00:11:58.794Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1
|
1410 | 2025-03-01T00:11:58.796Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "869b6e77-80a1-4349-aef5-c416d08b3b32", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1411 | 2025-03-01T00:11:58.797Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
1412 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b21d3c63-6a57-4dfc-9639-83f43e7b778d", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1413 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
1414 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "046a6d5d-1944-4c07-8b6a-bd616bba4096", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1415 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cmpa
|
1416 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f397c7ef-9693-4cc7-82d4-65984e4e8448", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1417 | 2025-03-01T00:11:58.799Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
1418 | 2025-03-01T00:11:58.803Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a90eb3f-85c6-459a-8537-b06920b38fe7", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1419 | 2025-03-01T00:11:58.803Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
1420 | 2025-03-01T00:11:58.806Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0c34ea4-9c5c-4816-8e44-12417accc070", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1421 | 2025-03-01T00:11:58.807Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
1422 | 2025-03-01T00:11:58.807Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4283e86-61e3-4ed0-ba0e-3f157a4fff67", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1423 | 2025-03-01T00:11:58.807Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1
|
1424 | 2025-03-01T00:11:58.808Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f22266dc-8404-427e-830c-ab2de0d6ceaa", "content-length": "723", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1425 | 2025-03-01T00:11:58.809Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0
|
1426 | 2025-03-01T00:11:58.810Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "68f9291c-4b5d-441d-8cb3-bbcaf58d1c5d", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1427 | 2025-03-01T00:11:58.810Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1
|
1428 | 2025-03-01T00:11:58.812Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "459a9e70-22d7-4cc7-bec0-073b2bdae443", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1429 | 2025-03-01T00:11:58.812Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0
|
1430 | 2025-03-01T00:11:58.813Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "186517f1-3744-4276-adb8-e74a91aa74d9", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1431 | 2025-03-01T00:11:58.814Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1
|
1432 | 2025-03-01T00:11:58.816Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "585c1058-c3fd-4556-800d-ce6b2e4693da", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1433 | 2025-03-01T00:11:58.816Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
1434 | 2025-03-01T00:11:58.817Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f15a7f9-c585-4478-a832-7dd51bc8cee4", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1435 | 2025-03-01T00:11:58.818Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
1436 | 2025-03-01T00:11:58.820Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c9b25d38-944a-4f97-abc1-02fcfb62ca56", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1437 | 2025-03-01T00:11:58.820Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cmpa
|
1438 | 2025-03-01T00:11:58.820Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "08cd2844-6d77-4544-8b24-30812e1a7fb3", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1439 | 2025-03-01T00:11:58.820Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
1440 | 2025-03-01T00:11:58.821Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7058d4b-9802-4878-b802-723547c98b6e", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1441 | 2025-03-01T00:11:58.822Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
1442 | 2025-03-01T00:11:58.822Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aa458e4b-7a75-4b04-80b4-766f827eedda", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1443 | 2025-03-01T00:11:58.822Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
1444 | 2025-03-01T00:11:58.824Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8fa8872-c63a-4421-a6b0-b74b2c92936e", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1445 | 2025-03-01T00:11:58.826Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
1446 | 2025-03-01T00:11:58.826Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1447 | 2025-03-01T00:11:58.826Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1448 | 2025-03-01T00:11:58.826Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1449 | 2025-03-01T00:11:58.826Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1450 | 2025-03-01T00:11:58.830Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1451 | 2025-03-01T00:11:58.834Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
1452 | 2025-03-01T00:11:58.841Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
1453 | 2025-03-01T00:11:58.841Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1454 | 2025-03-01T00:11:58.841Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1455 | 2025-03-01T00:11:58.841Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1456 | 2025-03-01T00:11:58.841Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1457 | 2025-03-01T00:11:58.841Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1458 | 2025-03-01T00:11:58.844Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
1459 | 2025-03-01T00:11:58.844Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1460 | 2025-03-01T00:11:58.844Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1461 | 2025-03-01T00:11:58.845Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1462 | 2025-03-01T00:11:58.889Z | DEBG | test_instance_serial (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:38105
|
1463 | 2025-03-01T00:11:58.889Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = http://[::1]:38105
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:38105/inventory
|
1464 | 2025-03-01T00:11:58.890Z | DEBG | test_instance_serial (service-firewall-rule-progator): resolved sleds for vpc oxide-services
background_task = service_firewall_rule_propagation
vpc_to_sled = []
|
1465 | 2025-03-01T00:11:58.890Z | DEBG | test_instance_serial (service-firewall-rule-progator): sending firewall rules to sled agents
background_task = service_firewall_rule_propagation
|
1466 | 2025-03-01T00:11:58.890Z | INFO | test_instance_serial (service-firewall-rule-progator): updated firewall rules on 0 sleds
background_task = service_firewall_rule_propagation
|
1467 | 2025-03-01T00:11:58.890Z | DEBG | test_instance_serial (service-firewall-rule-progator): successfully propagated service firewall rules
background_task = service_firewall_rule_propagation
elapsed = 2.965326935s
|
1468 | 2025-03-01T00:11:58.890Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = service_firewall_rule_propagation
elapsed = 2.965361976s
iteration = 1
status = {}
|
1469 | 2025-03-01T00:11:58.890Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50034
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1470 | 2025-03-01T00:11:58.891Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50034
req_id = 476609cf-7b84-4f2b-9c9a-79d20bac683f
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
1471 | 2025-03-01T00:11:58.891Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 374
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50034
req_id = 476609cf-7b84-4f2b-9c9a-79d20bac683f
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
1472 | 2025-03-01T00:11:58.891Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = http://[::1]:38105
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:38105/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "476609cf-7b84-4f2b-9c9a-79d20bac683f", "content-length": "2517", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
|
1473 | 2025-03-01T00:11:58.893Z | DEBG | test_instance_serial (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
1474 | 2025-03-01T00:11:58.894Z | DEBG | test_instance_serial (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
1475 | 2025-03-01T00:11:58.894Z | DEBG | test_instance_serial (BackgroundTasks): finished collection
background_task = inventory_collection
|
1476 | 2025-03-01T00:11:58.894Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
1477 | 2025-03-01T00:11:58.894Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1478 | 2025-03-01T00:11:58.895Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1479 | 2025-03-01T00:11:58.895Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1480 | 2025-03-01T00:11:58.895Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1481 | 2025-03-01T00:11:58.896Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1482 | 2025-03-01T00:11:58.901Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1483 | 2025-03-01T00:11:58.902Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1484 | 2025-03-01T00:11:58.902Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1485 | 2025-03-01T00:11:58.902Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1486 | 2025-03-01T00:11:58.953Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1487 | 2025-03-01T00:11:58.955Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1488 | 2025-03-01T00:11:58.955Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1489 | 2025-03-01T00:11:58.955Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1490 | 2025-03-01T00:11:58.955Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1491 | 2025-03-01T00:11:58.957Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1492 | 2025-03-01T00:11:58.961Z | DEBG | test_instance_serial (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1493 | 2025-03-01T00:11:58.961Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1494 | 2025-03-01T00:11:58.961Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1495 | 2025-03-01T00:11:58.962Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1496 | 2025-03-01T00:11:58.966Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
|
1497 | 2025-03-01T00:11:58.967Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1498 | 2025-03-01T00:11:58.967Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1499 | 2025-03-01T00:11:58.967Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1500 | 2025-03-01T00:11:58.967Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1501 | 2025-03-01T00:11:58.969Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1502 | 2025-03-01T00:11:58.976Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1503 | 2025-03-01T00:11:58.977Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1504 | 2025-03-01T00:11:58.977Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1505 | 2025-03-01T00:11:58.977Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1506 | 2025-03-01T00:11:58.979Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
|
1507 | 2025-03-01T00:11:58.980Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1508 | 2025-03-01T00:11:58.980Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1509 | 2025-03-01T00:11:58.980Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1510 | 2025-03-01T00:11:58.980Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1511 | 2025-03-01T00:11:58.982Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1512 | 2025-03-01T00:11:58.986Z | DEBG | test_instance_serial (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1513 | 2025-03-01T00:11:59.056Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
|
1514 | 2025-03-01T00:11:59.056Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1515 | 2025-03-01T00:11:59.056Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1516 | 2025-03-01T00:11:59.057Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1517 | 2025-03-01T00:11:59.057Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1518 | 2025-03-01T00:11:59.059Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1519 | 2025-03-01T00:11:59.065Z | DEBG | test_instance_serial (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
result = Ok(())
|
1520 | 2025-03-01T00:11:59.076Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
|
1521 | 2025-03-01T00:11:59.076Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1522 | 2025-03-01T00:11:59.076Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1523 | 2025-03-01T00:11:59.076Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1524 | 2025-03-01T00:11:59.079Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1525 | 2025-03-01T00:11:59.081Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1526 | 2025-03-01T00:11:59.092Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
result = Ok(())
|
1527 | 2025-03-01T00:11:59.636Z | INFO | test_instance_serial (InternalApi): inserted blueprint
blueprint_id = 3a246063-0482-421d-9e0b-524e1fe8c575
|
1528 | 2025-03-01T00:11:59.636Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
|
1529 | 2025-03-01T00:11:59.636Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1530 | 2025-03-01T00:11:59.636Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1531 | 2025-03-01T00:11:59.636Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1532 | 2025-03-01T00:11:59.637Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1533 | 2025-03-01T00:11:59.639Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1534 | 2025-03-01T00:11:59.644Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = BlueprintConfig
result = Ok(())
|
1535 | 2025-03-01T00:11:59.742Z | INFO | test_instance_serial (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = 5702d944-2c62-46b6-8f7d-27d83b7977da
|
1536 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = 5702d944-2c62-46b6-8f7d-27d83b7977da
time_started = 2025-03-01 00:11:57.240809 UTC
|
1537 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 3.061379675s
iteration = 2
status = {"collection_id":"5702d944-2c62-46b6-8f7d-27d83b7977da","time_done":"2025-03-01 00:11:58.892782 UTC","time_started":"2025-03-01 00:11:57.240809 UTC"}
|
1538 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 2
reason = Dependency
|
1539 | 2025-03-01T00:11:59.743Z | WARN | test_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
1540 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 60.632\u{b5}s
iteration = 2
status = {"error":"no blueprint"}
|
1541 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 2
reason = Dependency
|
1542 | 2025-03-01T00:11:59.743Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 10.97\u{b5}s
iteration = 2
status = {"error":"task disabled"}
|
1543 | 2025-03-01T00:11:59.747Z | INFO | test_instance_serial (InternalApi): Inserted networking records for nexus service
|
1544 | 2025-03-01T00:11:59.776Z | INFO | test_instance_serial (InternalApi): Inserted networking records for external_dns service
|
1545 | 2025-03-01T00:11:59.776Z | INFO | test_instance_serial (InternalApi): No networking records needed for internal_dns service
|
1546 | 2025-03-01T00:11:59.776Z | INFO | test_instance_serial (InternalApi): No networking records needed for clickhouse service
|
1547 | 2025-03-01T00:11:59.776Z | INFO | test_instance_serial (InternalApi): No networking records needed for crucible_pantry service
|
1548 | 2025-03-01T00:11:59.776Z | INFO | test_instance_serial (InternalApi): No networking records needed for cockroach_db service
|
1549 | 2025-03-01T00:11:59.777Z | INFO | test_instance_serial (InternalApi): Inserted service networking records
|
1550 | 2025-03-01T00:11:59.777Z | INFO | test_instance_serial (InternalApi): Inserted physical disks
|
1551 | 2025-03-01T00:11:59.777Z | INFO | test_instance_serial (InternalApi): Inserted zpools
|
1552 | 2025-03-01T00:11:59.777Z | INFO | test_instance_serial (InternalApi): Inserted datasets
|
1553 | 2025-03-01T00:11:59.812Z | INFO | test_instance_serial (InternalApi): Populated DNS tables for internal DNS
|
1554 | 2025-03-01T00:11:59.817Z | INFO | test_instance_serial (InternalApi): Populated DNS tables for external DNS
|
1555 | 2025-03-01T00:11:59.817Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1556 | 2025-03-01T00:11:59.817Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1557 | 2025-03-01T00:11:59.818Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1558 | 2025-03-01T00:11:59.818Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1559 | 2025-03-01T00:11:59.818Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1560 | 2025-03-01T00:11:59.820Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1561 | 2025-03-01T00:11:59.824Z | DEBG | test_instance_serial (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1562 | 2025-03-01T00:11:59.824Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1563 | 2025-03-01T00:11:59.824Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1564 | 2025-03-01T00:11:59.824Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1565 | 2025-03-01T00:11:59.824Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1566 | 2025-03-01T00:11:59.824Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1567 | 2025-03-01T00:11:59.828Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1568 | 2025-03-01T00:11:59.831Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1569 | 2025-03-01T00:11:59.859Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1570 | 2025-03-01T00:11:59.859Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1571 | 2025-03-01T00:11:59.860Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1572 | 2025-03-01T00:11:59.861Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1573 | 2025-03-01T00:11:59.861Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1574 | 2025-03-01T00:11:59.862Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1575 | 2025-03-01T00:11:59.868Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1576 | 2025-03-01T00:11:59.868Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1577 | 2025-03-01T00:11:59.868Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1578 | 2025-03-01T00:11:59.868Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1579 | 2025-03-01T00:11:59.868Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1580 | 2025-03-01T00:11:59.869Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1581 | 2025-03-01T00:11:59.871Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1582 | 2025-03-01T00:11:59.877Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1583 | 2025-03-01T00:11:59.879Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
|
1584 | 2025-03-01T00:11:59.879Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1585 | 2025-03-01T00:11:59.879Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1586 | 2025-03-01T00:11:59.879Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1587 | 2025-03-01T00:11:59.880Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1588 | 2025-03-01T00:11:59.881Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1589 | 2025-03-01T00:11:59.887Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = DnsConfig
result = Ok(())
|
1590 | 2025-03-01T00:11:59.894Z | INFO | test_instance_serial (InternalApi): Created recovery silo
|
1591 | 2025-03-01T00:11:59.895Z | INFO | test_instance_serial (InternalApi): Created recovery user
|
1592 | 2025-03-01T00:11:59.931Z | INFO | test_instance_serial (InternalApi): Created recovery user's password
|
1593 | 2025-03-01T00:11:59.932Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Silo { parent: Fleet, key: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, lookup_type: ById(dc7acbaa-3bf5-44f0-bd58-7164e43b87a2) }
|
1594 | 2025-03-01T00:11:59.932Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = dc7acbaa-3bf5-44f0-bd58-7164e43b87a2
resource_type = Silo
|
1595 | 2025-03-01T00:11:59.932Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1596 | 2025-03-01T00:11:59.932Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1597 | 2025-03-01T00:11:59.932Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1598 | 2025-03-01T00:11:59.934Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1599 | 2025-03-01T00:11:59.934Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1600 | 2025-03-01T00:11:59.934Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1601 | 2025-03-01T00:11:59.934Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1602 | 2025-03-01T00:11:59.936Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1603 | 2025-03-01T00:11:59.939Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Silo { parent: Fleet, key: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, lookup_type: ById(dc7acbaa-3bf5-44f0-bd58-7164e43b87a2) }
result = Ok(())
|
1604 | 2025-03-01T00:11:59.940Z | DEBG | test_instance_serial (InternalApi): Generated role assignment queries
|
1605 | 2025-03-01T00:11:59.948Z | INFO | test_instance_serial (InternalApi): Granted Silo privileges
|
1606 | 2025-03-01T00:11:59.949Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1607 | 2025-03-01T00:11:59.949Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1608 | 2025-03-01T00:11:59.949Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1609 | 2025-03-01T00:11:59.949Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1610 | 2025-03-01T00:11:59.950Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1611 | 2025-03-01T00:11:59.958Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1612 | 2025-03-01T00:11:59.961Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1613 | 2025-03-01T00:11:59.981Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1614 | 2025-03-01T00:11:59.981Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1615 | 2025-03-01T00:11:59.981Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1616 | 2025-03-01T00:11:59.985Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1617 | 2025-03-01T00:11:59.985Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1618 | 2025-03-01T00:11:59.985Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1619 | 2025-03-01T00:11:59.986Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1620 | 2025-03-01T00:11:59.986Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1621 | 2025-03-01T00:11:59.987Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1622 | 2025-03-01T00:11:59.989Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1623 | 2025-03-01T00:11:59.989Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1624 | 2025-03-01T00:11:59.989Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1625 | 2025-03-01T00:11:59.989Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1626 | 2025-03-01T00:11:59.989Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1627 | 2025-03-01T00:11:59.991Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1628 | 2025-03-01T00:11:59.991Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1629 | 2025-03-01T00:11:59.991Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1630 | 2025-03-01T00:11:59.992Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1631 | 2025-03-01T00:11:59.995Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1632 | 2025-03-01T00:11:59.995Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1633 | 2025-03-01T00:11:59.995Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1634 | 2025-03-01T00:11:59.996Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1635 | 2025-03-01T00:11:59.998Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1636 | 2025-03-01T00:12:00.011Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1637 | 2025-03-01T00:12:00.011Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
1638 | 2025-03-01T00:12:00.011Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1639 | 2025-03-01T00:12:00.011Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1640 | 2025-03-01T00:12:00.012Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1641 | 2025-03-01T00:12:00.013Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1642 | 2025-03-01T00:12:00.013Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1643 | 2025-03-01T00:12:00.014Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1644 | 2025-03-01T00:12:00.015Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1645 | 2025-03-01T00:12:00.015Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1646 | 2025-03-01T00:12:00.016Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1647 | 2025-03-01T00:12:00.017Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1648 | 2025-03-01T00:12:00.017Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1649 | 2025-03-01T00:12:00.017Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1650 | 2025-03-01T00:12:00.017Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1651 | 2025-03-01T00:12:00.019Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1652 | 2025-03-01T00:12:00.028Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1653 | 2025-03-01T00:12:00.028Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1654 | 2025-03-01T00:12:00.028Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1655 | 2025-03-01T00:12:00.028Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1656 | 2025-03-01T00:12:00.031Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1657 | 2025-03-01T00:12:00.031Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1658 | 2025-03-01T00:12:00.032Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1659 | 2025-03-01T00:12:00.033Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1660 | 2025-03-01T00:12:00.033Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1661 | 2025-03-01T00:12:00.034Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1662 | 2025-03-01T00:12:00.035Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1663 | 2025-03-01T00:12:00.035Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1664 | 2025-03-01T00:12:00.036Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1665 | 2025-03-01T00:12:00.037Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1666 | 2025-03-01T00:12:00.037Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1667 | 2025-03-01T00:12:00.038Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1668 | 2025-03-01T00:12:00.038Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1669 | 2025-03-01T00:12:00.038Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1670 | 2025-03-01T00:12:00.051Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1671 | 2025-03-01T00:12:00.051Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1672 | 2025-03-01T00:12:00.051Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1673 | 2025-03-01T00:12:00.052Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1674 | 2025-03-01T00:12:00.054Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1675 | 2025-03-01T00:12:00.054Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1676 | 2025-03-01T00:12:00.055Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1677 | 2025-03-01T00:12:00.055Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1678 | 2025-03-01T00:12:00.056Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1679 | 2025-03-01T00:12:00.064Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1680 | 2025-03-01T00:12:00.064Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
1681 | 2025-03-01T00:12:00.064Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1682 | 2025-03-01T00:12:00.064Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1683 | 2025-03-01T00:12:00.065Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1684 | 2025-03-01T00:12:00.071Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1685 | 2025-03-01T00:12:00.071Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1686 | 2025-03-01T00:12:00.072Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1687 | 2025-03-01T00:12:00.073Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1688 | 2025-03-01T00:12:00.073Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1689 | 2025-03-01T00:12:00.074Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1690 | 2025-03-01T00:12:00.076Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1691 | 2025-03-01T00:12:00.076Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1692 | 2025-03-01T00:12:00.076Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1693 | 2025-03-01T00:12:00.078Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1694 | 2025-03-01T00:12:00.079Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1695 | 2025-03-01T00:12:00.079Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1696 | 2025-03-01T00:12:00.079Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1697 | 2025-03-01T00:12:00.079Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1698 | 2025-03-01T00:12:00.080Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1699 | 2025-03-01T00:12:00.081Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1700 | 2025-03-01T00:12:00.081Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1701 | 2025-03-01T00:12:00.081Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1702 | 2025-03-01T00:12:00.083Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1703 | 2025-03-01T00:12:00.084Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1704 | 2025-03-01T00:12:00.084Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1705 | 2025-03-01T00:12:00.084Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1706 | 2025-03-01T00:12:00.085Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1707 | 2025-03-01T00:12:00.093Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1708 | 2025-03-01T00:12:00.093Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
1709 | 2025-03-01T00:12:00.093Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
1710 | 2025-03-01T00:12:00.093Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1711 | 2025-03-01T00:12:00.093Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1712 | 2025-03-01T00:12:00.093Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1713 | 2025-03-01T00:12:00.094Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1714 | 2025-03-01T00:12:00.095Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1715 | 2025-03-01T00:12:00.096Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1716 | 2025-03-01T00:12:00.097Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1717 | 2025-03-01T00:12:00.097Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1718 | 2025-03-01T00:12:00.098Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1719 | 2025-03-01T00:12:00.099Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1720 | 2025-03-01T00:12:00.100Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1721 | 2025-03-01T00:12:00.100Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1722 | 2025-03-01T00:12:00.100Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1723 | 2025-03-01T00:12:00.108Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
1724 | 2025-03-01T00:12:00.109Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1725 | 2025-03-01T00:12:00.109Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1726 | 2025-03-01T00:12:00.109Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1727 | 2025-03-01T00:12:00.113Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1728 | 2025-03-01T00:12:00.113Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1729 | 2025-03-01T00:12:00.113Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1730 | 2025-03-01T00:12:00.116Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1731 | 2025-03-01T00:12:00.116Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1732 | 2025-03-01T00:12:00.117Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1733 | 2025-03-01T00:12:00.120Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1734 | 2025-03-01T00:12:00.120Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1735 | 2025-03-01T00:12:00.121Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1736 | 2025-03-01T00:12:00.123Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1737 | 2025-03-01T00:12:00.123Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1738 | 2025-03-01T00:12:00.123Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1739 | 2025-03-01T00:12:00.125Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1740 | 2025-03-01T00:12:00.126Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1741 | 2025-03-01T00:12:00.126Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1742 | 2025-03-01T00:12:00.126Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1743 | 2025-03-01T00:12:00.126Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1744 | 2025-03-01T00:12:00.127Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1745 | 2025-03-01T00:12:00.129Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1746 | 2025-03-01T00:12:00.129Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1747 | 2025-03-01T00:12:00.129Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1748 | 2025-03-01T00:12:00.130Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1749 | 2025-03-01T00:12:00.131Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1750 | 2025-03-01T00:12:00.131Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1751 | 2025-03-01T00:12:00.131Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1752 | 2025-03-01T00:12:00.132Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1753 | 2025-03-01T00:12:00.141Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1754 | 2025-03-01T00:12:00.141Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
1755 | 2025-03-01T00:12:00.141Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
1756 | 2025-03-01T00:12:00.141Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1757 | 2025-03-01T00:12:00.141Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1758 | 2025-03-01T00:12:00.141Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1759 | 2025-03-01T00:12:00.141Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1760 | 2025-03-01T00:12:00.143Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1761 | 2025-03-01T00:12:00.143Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1762 | 2025-03-01T00:12:00.143Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1763 | 2025-03-01T00:12:00.143Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1764 | 2025-03-01T00:12:00.145Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1765 | 2025-03-01T00:12:00.145Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1766 | 2025-03-01T00:12:00.145Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1767 | 2025-03-01T00:12:00.146Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1768 | 2025-03-01T00:12:00.148Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1769 | 2025-03-01T00:12:00.157Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
1770 | 2025-03-01T00:12:00.157Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1771 | 2025-03-01T00:12:00.157Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1772 | 2025-03-01T00:12:00.157Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1773 | 2025-03-01T00:12:00.163Z | DEBG | test_instance_serial (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]}
subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]}
vpc_interfaces = {}
|
1774 | 2025-03-01T00:12:00.163Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
1775 | 2025-03-01T00:12:00.163Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1776 | 2025-03-01T00:12:00.164Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1777 | 2025-03-01T00:12:00.164Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1778 | 2025-03-01T00:12:00.164Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1779 | 2025-03-01T00:12:00.165Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1780 | 2025-03-01T00:12:00.169Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
1781 | 2025-03-01T00:12:00.169Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1782 | 2025-03-01T00:12:00.169Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1783 | 2025-03-01T00:12:00.169Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1784 | 2025-03-01T00:12:00.171Z | TRAC | test_instance_serial (nexus): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-03-01T00:11:59.963399Z, allowed_ips: None }
|
1785 | 2025-03-01T00:12:00.171Z | DEBG | test_instance_serial (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
1786 | 2025-03-01T00:12:00.171Z | DEBG | test_instance_serial (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
|
1787 | 2025-03-01T00:12:00.171Z | DEBG | test_instance_serial (nexus): resolved 2 rules for sleds
|
1788 | 2025-03-01T00:12:00.258Z | DEBG | test_instance_serial (nexus): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-01T00:11:55.931359Z, time_modified: 2025-03-01T00:11:55.931359Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(38105), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(34345) }]
|
1789 | 2025-03-01T00:12:00.259Z | DEBG | test_instance_serial (nexus): sending firewall rules to sled agents
|
1790 | 2025-03-01T00:12:00.259Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
1791 | 2025-03-01T00:12:00.259Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
1792 | 2025-03-01T00:12:00.259Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
1793 | 2025-03-01T00:12:00.262Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
1794 | 2025-03-01T00:12:00.262Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1795 | 2025-03-01T00:12:00.262Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
1796 | 2025-03-01T00:12:00.262Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
1797 | 2025-03-01T00:12:00.262Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
1798 | 2025-03-01T00:12:00.265Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
1799 | 2025-03-01T00:12:00.269Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
1800 | 2025-03-01T00:12:00.314Z | DEBG | test_instance_serial (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1801 | 2025-03-01T00:12:00.315Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50036
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
1802 | 2025-03-01T00:12:00.315Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50036
req_id = ed30668f-0ba6-43e6-b332-457cbdc6ee0e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1803 | 2025-03-01T00:12:00.316Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 621
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50036
req_id = ed30668f-0ba6-43e6-b332-457cbdc6ee0e
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
1804 | 2025-03-01T00:12:00.317Z | DEBG | test_instance_serial (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "ed30668f-0ba6-43e6-b332-457cbdc6ee0e", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
1805 | 2025-03-01T00:12:00.317Z | INFO | test_instance_serial (nexus): updated firewall rules on 1 sleds
|
1806 | 2025-03-01T00:12:00.318Z | TRAC | test_instance_serial (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
|
1807 | 2025-03-01T00:12:00.318Z | DEBG | test_instance_serial (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
1808 | 2025-03-01T00:12:00.318Z | DEBG | test_instance_serial (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
result = Ok(())
|
1809 | 2025-03-01T00:12:00.319Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 2
reason = Signaled
|
1810 | 2025-03-01T00:12:00.319Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
1811 | 2025-03-01T00:12:00.319Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1812 | 2025-03-01T00:12:00.319Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1813 | 2025-03-01T00:12:00.319Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1814 | 2025-03-01T00:12:00.320Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 2
reason = Signaled
|
1815 | 2025-03-01T00:12:00.320Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
1816 | 2025-03-01T00:12:00.320Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 2
reason = Signaled
|
1817 | 2025-03-01T00:12:00.320Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
1818 | 2025-03-01T00:12:00.320Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
1819 | 2025-03-01T00:12:00.320Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
1820 | 2025-03-01T00:12:00.321Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
1821 | 2025-03-01T00:12:00.321Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 2
reason = Signaled
|
1822 | 2025-03-01T00:12:00.321Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
1823 | 2025-03-01T00:12:00.321Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = external_endpoints
iteration = 2
reason = Signaled
|
1824 | 2025-03-01T00:12:00.321Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
1825 | 2025-03-01T00:12:00.321Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1826 | 2025-03-01T00:12:00.321Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1827 | 2025-03-01T00:12:00.322Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1828 | 2025-03-01T00:12:00.322Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1829 | 2025-03-01T00:12:00.322Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = inventory_collection
iteration = 3
reason = Signaled
|
1830 | 2025-03-01T00:12:00.322Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
1831 | 2025-03-01T00:12:00.322Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1832 | 2025-03-01T00:12:00.322Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1833 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1834 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1835 | 2025-03-01T00:12:00.323Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: b8 61 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .a..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:63186
req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
|
1836 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 47201,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:63186
req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
|
1837 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (store): query key
key = _nameservice._tcp
|
1838 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (store): query key
key = 56963668-32be-40a0-9656-db179a86c4fe.host
|
1839 | 2025-03-01T00:12:00.323Z | DEBG | test_instance_serial (dns): dns response
additional_records = [Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:63186
query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42817, target: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal") })) }]
req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
|
1840 | 2025-03-01T00:12:00.323Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 8b 26 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .&..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:52789
req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
|
1841 | 2025-03-01T00:12:00.324Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 35622,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:52789
req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
|
1842 | 2025-03-01T00:12:00.324Z | DEBG | test_instance_serial (store): query key
key = _external-dns._tcp
|
1843 | 2025-03-01T00:12:00.324Z | DEBG | test_instance_serial (store): query key
key = 4a162527-5074-4520-add9-9cf6820a1f4a.host
|
1844 | 2025-03-01T00:12:00.325Z | DEBG | test_instance_serial (dns): dns response
additional_records = [Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:52789
query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 44469, target: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal") })) }]
req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
|
1845 | 2025-03-01T00:12:00.325Z | DEBG | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42817, target: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 91684493 } })
|
1846 | 2025-03-01T00:12:00.325Z | TRAC | test_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
|
1847 | 2025-03-01T00:12:00.325Z | DEBG | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 44469, target: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 92605317 } })
|
1848 | 2025-03-01T00:12:00.325Z | TRAC | test_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
|
1849 | 2025-03-01T00:12:00.325Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
1850 | 2025-03-01T00:12:00.325Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1851 | 2025-03-01T00:12:00.325Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1852 | 2025-03-01T00:12:00.325Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1853 | 2025-03-01T00:12:00.326Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1854 | 2025-03-01T00:12:00.326Z | TRAC | test_instance_serial (ServiceBalancer): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
1855 | 2025-03-01T00:12:00.326Z | TRAC | test_instance_serial (ServiceBalancer): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1856 | 2025-03-01T00:12:00.326Z | TRAC | test_instance_serial (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
|
1857 | 2025-03-01T00:12:00.326Z | DEBG | test_instance_serial (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
1858 | 2025-03-01T00:12:00.327Z | DEBG | test_instance_serial (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Database
result = Ok(())
|
1859 | 2025-03-01T00:12:00.327Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
1860 | 2025-03-01T00:12:00.328Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1861 | 2025-03-01T00:12:00.328Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
1862 | 2025-03-01T00:12:00.328Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
1863 | 2025-03-01T00:12:00.328Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
1864 | 2025-03-01T00:12:00.328Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 03 a9 01 00 00 01 00 00 00 00 00 01 24 35 36 39 ............$569\n0010: 36 33 36 36 38 2d 33 32 62 65 2d 34 30 61 30 2d 63668-32be-40a0-\n0020: 39 36 35 36 2d 64 62 31 37 39 61 38 36 63 34 66 9656-db179a86c4f\n0030: 65 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 e.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:64612
req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
|
1865 | 2025-03-01T00:12:00.328Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 937,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 53,\n 54,\n 57,\n 54,\n 51,\n 54,\n 54,\n 56,\n 45,\n 51,\n 50,\n 98,\n 101,\n 45,\n 52,\n 48,\n 97,\n 48,\n 45,\n 57,\n 54,\n 53,\n 54,\n 45,\n 100,\n 98,\n 49,\n 55,\n 57,\n 97,\n 56,\n 54,\n 99,\n 52,\n 102,\n 101,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:64612
req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
|
1866 | 2025-03-01T00:12:00.329Z | DEBG | test_instance_serial (store): query key
key = 56963668-32be-40a0-9656-db179a86c4fe.host
|
1867 | 2025-03-01T00:12:00.329Z | DEBG | test_instance_serial (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:64612
query = LowerQuery { name: LowerName(Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal.")), original: Query { name: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
|
1868 | 2025-03-01T00:12:00.329Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 9c e6 01 00 00 01 00 00 00 00 00 01 24 34 61 31 ............$4a1\n0010: 36 32 35 32 37 2d 35 30 37 34 2d 34 35 32 30 2d 62527-5074-4520-\n0020: 61 64 64 39 2d 39 63 66 36 38 32 30 61 31 66 34 add9-9cf6820a1f4\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:62200
req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
|
1869 | 2025-03-01T00:12:00.329Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 40166,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 52,\n 97,\n 49,\n 54,\n 50,\n 53,\n 50,\n 55,\n 45,\n 53,\n 48,\n 55,\n 52,\n 45,\n 52,\n 53,\n 50,\n 48,\n 45,\n 97,\n 100,\n 100,\n 57,\n 45,\n 57,\n 99,\n 102,\n 54,\n 56,\n 50,\n 48,\n 97,\n 49,\n 102,\n 52,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:62200
req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
|
1870 | 2025-03-01T00:12:00.329Z | DEBG | test_instance_serial (store): query key
key = 4a162527-5074-4520-add9-9cf6820a1f4a.host
|
1871 | 2025-03-01T00:12:00.330Z | DEBG | test_instance_serial (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:62200
query = LowerQuery { name: LowerName(Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal.")), original: Query { name: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
|
1872 | 2025-03-01T00:12:00.330Z | INFO | test_instance_serial (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:42817] }
background_task = dns_servers_internal
dns_group = internal
|
1873 | 2025-03-01T00:12:00.330Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 10.903585ms
iteration = 2
status = {"addresses":["[::1]:42817"]}
|
1874 | 2025-03-01T00:12:00.330Z | INFO | test_instance_serial (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:44469] }
background_task = dns_servers_external
dns_group = external
|
1875 | 2025-03-01T00:12:00.330Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 10.414002ms
iteration = 2
status = {"addresses":["[::1]:44469"]}
|
1876 | 2025-03-01T00:12:00.332Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 2
reason = Dependency
|
1877 | 2025-03-01T00:12:00.332Z | WARN | test_instance_serial (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config
|
1878 | 2025-03-01T00:12:00.332Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 33.292\u{b5}s
iteration = 2
status = {"error":"no config"}
|
1879 | 2025-03-01T00:12:00.332Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 2
reason = Dependency
|
1880 | 2025-03-01T00:12:00.332Z | WARN | test_instance_serial (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config
|
1881 | 2025-03-01T00:12:00.332Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 15.891\u{b5}s
iteration = 2
status = {"error":"no config"}
|
1882 | 2025-03-01T00:12:00.332Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1883 | 2025-03-01T00:12:00.335Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
1884 | 2025-03-01T00:12:00.336Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1885 | 2025-03-01T00:12:00.336Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1886 | 2025-03-01T00:12:00.336Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1887 | 2025-03-01T00:12:00.336Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1888 | 2025-03-01T00:12:00.340Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
1889 | 2025-03-01T00:12:00.340Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
1890 | 2025-03-01T00:12:00.340Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
1891 | 2025-03-01T00:12:00.341Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
1892 | 2025-03-01T00:12:00.342Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1893 | 2025-03-01T00:12:00.347Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
1894 | 2025-03-01T00:12:00.348Z | DEBG | test_instance_serial (BackgroundTasks): found DNS version
background_task = dns_config_internal
dns_group = internal
version = 1
|
1895 | 2025-03-01T00:12:00.349Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS config
background_task = dns_config_internal
dns_group = internal
|
1896 | 2025-03-01T00:12:00.349Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS zones
background_task = dns_config_internal
dns_group = internal
|
1897 | 2025-03-01T00:12:00.349Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
1898 | 2025-03-01T00:12:00.349Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1899 | 2025-03-01T00:12:00.349Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1900 | 2025-03-01T00:12:00.349Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1901 | 2025-03-01T00:12:00.349Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1902 | 2025-03-01T00:12:00.350Z | DEBG | test_instance_serial (ServiceBalancer): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1903 | 2025-03-01T00:12:00.356Z | DEBG | test_instance_serial (ServiceBalancer): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
1904 | 2025-03-01T00:12:00.356Z | INFO | test_instance_serial (nexus): Rack initialized
|
1905 | 2025-03-01T00:12:00.356Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1906 | 2025-03-01T00:12:00.357Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1907 | 2025-03-01T00:12:00.357Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1908 | 2025-03-01T00:12:00.359Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
|
1909 | 2025-03-01T00:12:00.359Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1910 | 2025-03-01T00:12:00.359Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1911 | 2025-03-01T00:12:00.359Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1912 | 2025-03-01T00:12:00.360Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1913 | 2025-03-01T00:12:00.361Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1914 | 2025-03-01T00:12:00.366Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
1915 | 2025-03-01T00:12:00.367Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1916 | 2025-03-01T00:12:00.367Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1917 | 2025-03-01T00:12:00.367Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1918 | 2025-03-01T00:12:00.375Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1919 | 2025-03-01T00:12:00.375Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1920 | 2025-03-01T00:12:00.376Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1921 | 2025-03-01T00:12:00.381Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1922 | 2025-03-01T00:12:00.381Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1923 | 2025-03-01T00:12:00.382Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1924 | 2025-03-01T00:12:00.386Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1925 | 2025-03-01T00:12:00.386Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1926 | 2025-03-01T00:12:00.387Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1927 | 2025-03-01T00:12:00.387Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1928 | 2025-03-01T00:12:00.387Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1929 | 2025-03-01T00:12:00.387Z | DEBG | test_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = [(5702d944-2c62-46b6-8f7d-27d83b7977da, 0)]
|
1930 | 2025-03-01T00:12:00.389Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
1931 | 2025-03-01T00:12:00.390Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 5b 09 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 [............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:53256
req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
|
1932 | 2025-03-01T00:12:00.390Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 23305,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:53256
req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
|
1933 | 2025-03-01T00:12:00.391Z | DEBG | test_instance_serial (store): query key
key = _mgs._tcp
|
1934 | 2025-03-01T00:12:00.391Z | DEBG | test_instance_serial (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
1935 | 2025-03-01T00:12:00.391Z | DEBG | test_instance_serial (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:53256
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }]
req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
|
1936 | 2025-03-01T00:12:00.391Z | DEBG | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 158654163 } })
|
1937 | 2025-03-01T00:12:00.391Z | TRAC | test_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
|
1938 | 2025-03-01T00:12:00.392Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: ff d5 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:55725
req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
|
1939 | 2025-03-01T00:12:00.392Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 65493,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:55725
req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
|
1940 | 2025-03-01T00:12:00.392Z | DEBG | test_instance_serial (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
1941 | 2025-03-01T00:12:00.394Z | DEBG | test_instance_serial (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:55725
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
|
1942 | 2025-03-01T00:12:00.394Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
1943 | 2025-03-01T00:12:00.394Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1944 | 2025-03-01T00:12:00.394Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1945 | 2025-03-01T00:12:00.394Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1946 | 2025-03-01T00:12:00.430Z | TRAC | test_instance_serial (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
1947 | 2025-03-01T00:12:00.431Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1948 | 2025-03-01T00:12:00.437Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
1949 | 2025-03-01T00:12:00.437Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1950 | 2025-03-01T00:12:00.443Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
1951 | 2025-03-01T00:12:00.444Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
1952 | 2025-03-01T00:12:00.444Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
1953 | 2025-03-01T00:12:00.444Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
1954 | 2025-03-01T00:12:00.445Z | DEBG | test_instance_serial (BackgroundTasks): found zones
background_task = dns_config_internal
count = 1
dns_group = internal
|
1955 | 2025-03-01T00:12:00.445Z | DEBG | test_instance_serial (BackgroundTasks): listing DNS names for zone
background_task = dns_config_internal
batch_size = 100
dns_group = internal
dns_zone_id = 5fff1c86-0b4b-47d2-9409-c52adf9914cd
dns_zone_name = control-plane.oxide.internal
found_so_far = 0
version = 1
|
1956 | 2025-03-01T00:12:00.445Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
1957 | 2025-03-01T00:12:00.445Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1958 | 2025-03-01T00:12:00.445Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1959 | 2025-03-01T00:12:00.445Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1960 | 2025-03-01T00:12:00.450Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1961 | 2025-03-01T00:12:00.451Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 42 8f 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c B............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:60502
req_id = 12b045ef-eb24-4466-bc45-cde674644162
|
1962 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 17039,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:60502
req_id = 12b045ef-eb24-4466-bc45-cde674644162
|
1963 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (store): query key
key = _clickhouse-admin-keeper._tcp
|
1964 | 2025-03-01T00:12:00.451Z | ERRO | test_instance_serial (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 17039,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
query: WireQuery {
query: LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
dnssec_ok: false,
max_payload: 1232,
options: OPT {
options: {},
},
},
),
} NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:60502
req_id = 12b045ef-eb24-4466-bc45-cde674644162
|
1965 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (BackgroundTasks): begin collection
background_task = inventory_collection
|
1966 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:39563
|
1967 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/ignition
|
1968 | 2025-03-01T00:12:00.451Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1969 | 2025-03-01T00:12:00.451Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1970 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1971 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1972 | 2025-03-01T00:12:00.451Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1973 | 2025-03-01T00:12:00.456Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
1974 | 2025-03-01T00:12:00.456Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
1975 | 2025-03-01T00:12:00.456Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
1976 | 2025-03-01T00:12:00.456Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
1977 | 2025-03-01T00:12:00.458Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "69aeb42c-0e1b-433d-bc6f-ff8397989312", "content-length": "835", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
1978 | 2025-03-01T00:12:00.458Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0
|
1979 | 2025-03-01T00:12:00.459Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
1980 | 2025-03-01T00:12:00.467Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
1981 | 2025-03-01T00:12:00.467Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
1982 | 2025-03-01T00:12:00.468Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
1983 | 2025-03-01T00:12:00.468Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
1984 | 2025-03-01T00:12:00.468Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
1985 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
1986 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
1987 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (BackgroundTasks): found all DNS names for zone
background_task = dns_config_internal
dns_group = internal
dns_zone_id = 5fff1c86-0b4b-47d2-9409-c52adf9914cd
dns_zone_name = control-plane.oxide.internal
found_so_far = 17
version = 1
|
1988 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (BackgroundTasks): read DNS config
background_task = dns_config_internal
dns_group = internal
nzones = 1
version = 1
|
1989 | 2025-03-01T00:12:00.468Z | INFO | test_instance_serial (BackgroundTasks): found latest generation (first find)
background_task = dns_config_internal
dns_group = internal
generation = 1
|
1990 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 149.035443ms
iteration = 2
status = {"generation":1}
|
1991 | 2025-03-01T00:12:00.468Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 3
reason = Dependency
|
1992 | 2025-03-01T00:12:00.503Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = dns_propagation_internal
body = Some(Body)
dns_group = internal
dns_server_url = http://[::1]:42817
generation = 1
method = PUT
servers = DnsServersList { addresses: [[::1]:42817] }
uri = http://[::1]:42817/config
|
1993 | 2025-03-01T00:12:00.504Z | DEBG | test_instance_serial (BackgroundTasks): found DNS version
background_task = dns_config_external
dns_group = external
version = 2
|
1994 | 2025-03-01T00:12:00.504Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS config
background_task = dns_config_external
dns_group = external
|
1995 | 2025-03-01T00:12:00.504Z | DEBG | test_instance_serial (BackgroundTasks): reading DNS zones
background_task = dns_config_external
dns_group = external
|
1996 | 2025-03-01T00:12:00.504Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
1997 | 2025-03-01T00:12:00.504Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
1998 | 2025-03-01T00:12:00.504Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
1999 | 2025-03-01T00:12:00.504Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2000 | 2025-03-01T00:12:00.504Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2001 | 2025-03-01T00:12:00.505Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
|
2002 | 2025-03-01T00:12:00.505Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2003 | 2025-03-01T00:12:00.506Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
2004 | 2025-03-01T00:12:00.506Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
2005 | 2025-03-01T00:12:00.506Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
2006 | 2025-03-01T00:12:00.506Z | INFO | test_instance_serial (http): accepted connection
kind = dns
local_addr = [::1]:42817
remote_addr = [::1]:42950
|
2007 | 2025-03-01T00:12:00.506Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2008 | 2025-03-01T00:12:00.506Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2009 | 2025-03-01T00:12:00.506Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2010 | 2025-03-01T00:12:00.507Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2011 | 2025-03-01T00:12:00.508Z | TRAC | test_instance_serial (http): incoming request
kind = dns
local_addr = [::1]:42817
method = PUT
remote_addr = [::1]:42950
req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
uri = /config
|
2012 | 2025-03-01T00:12:00.508Z | INFO | test_instance_serial (store): attempting generation update
new_generation = 1
req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
|
2013 | 2025-03-01T00:12:00.508Z | INFO | test_instance_serial (store): updated generation
new_generation = 1
req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
|
2014 | 2025-03-01T00:12:00.508Z | INFO | test_instance_serial (http): request completed
kind = dns
latency_us = 767
local_addr = [::1]:42817
method = PUT
remote_addr = [::1]:42950
req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
response_code = 204
uri = /config
|
2015 | 2025-03-01T00:12:00.508Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2016 | 2025-03-01T00:12:00.513Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
2017 | 2025-03-01T00:12:00.514Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2018 | 2025-03-01T00:12:00.514Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2019 | 2025-03-01T00:12:00.514Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2020 | 2025-03-01T00:12:00.515Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2021 | 2025-03-01T00:12:00.518Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
2022 | 2025-03-01T00:12:00.519Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
|
2023 | 2025-03-01T00:12:00.519Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
2024 | 2025-03-01T00:12:00.519Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
2025 | 2025-03-01T00:12:00.520Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:42817
generation = 1
result = Ok(Response { url: "http://[::1]:42817/config", status: 204, headers: {"x-request-id": "38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
servers = DnsServersList { addresses: [[::1]:42817] }
|
2026 | 2025-03-01T00:12:00.520Z | INFO | test_instance_serial (BackgroundTasks): DNS server now at generation 1
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:42817
generation = 1
servers = DnsServersList { addresses: [[::1]:42817] }
|
2027 | 2025-03-01T00:12:00.521Z | INFO | test_instance_serial (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_internal
dns_group = internal
generation = 1
servers = DnsServersList { addresses: [[::1]:42817] }
|
2028 | 2025-03-01T00:12:00.521Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 53.360075ms
iteration = 3
status = {"generation":1,"server_results":{"[::1]:42817":{"Ok":null}}}
|
2029 | 2025-03-01T00:12:00.522Z | DEBG | test_instance_serial (BackgroundTasks): found zones
background_task = dns_config_external
count = 1
dns_group = external
|
2030 | 2025-03-01T00:12:00.522Z | DEBG | test_instance_serial (BackgroundTasks): listing DNS names for zone
background_task = dns_config_external
batch_size = 100
dns_group = external
dns_zone_id = 07110f70-f19c-4c8e-ac7d-5b3429a936ec
dns_zone_name = oxide-dev.test
found_so_far = 0
version = 2
|
2031 | 2025-03-01T00:12:00.522Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
2032 | 2025-03-01T00:12:00.523Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2033 | 2025-03-01T00:12:00.523Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2034 | 2025-03-01T00:12:00.523Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2035 | 2025-03-01T00:12:00.523Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2036 | 2025-03-01T00:12:00.523Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2037 | 2025-03-01T00:12:00.523Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2038 | 2025-03-01T00:12:00.523Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2039 | 2025-03-01T00:12:00.524Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2040 | 2025-03-01T00:12:00.524Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6529069f-c39e-4885-8412-8ae7206e6f79", "content-length": "734", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2041 | 2025-03-01T00:12:00.525Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0
|
2042 | 2025-03-01T00:12:00.525Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2043 | 2025-03-01T00:12:00.532Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
2044 | 2025-03-01T00:12:00.532Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
2045 | 2025-03-01T00:12:00.532Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
2046 | 2025-03-01T00:12:00.532Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
2047 | 2025-03-01T00:12:00.533Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2048 | 2025-03-01T00:12:00.540Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
2049 | 2025-03-01T00:12:00.541Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2050 | 2025-03-01T00:12:00.541Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2051 | 2025-03-01T00:12:00.541Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2052 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6793ca5b-65a6-4f6f-a888-d63b55f78834", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2053 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1
|
2054 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): found all DNS names for zone
background_task = dns_config_external
dns_group = external
dns_zone_id = 07110f70-f19c-4c8e-ac7d-5b3429a936ec
dns_zone_name = oxide-dev.test
found_so_far = 1
version = 2
|
2055 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): read DNS config
background_task = dns_config_external
dns_group = external
nzones = 1
version = 2
|
2056 | 2025-03-01T00:12:00.544Z | INFO | test_instance_serial (BackgroundTasks): found latest generation (first find)
background_task = dns_config_external
dns_group = external
generation = 2
|
2057 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 224.343292ms
iteration = 2
status = {"generation":2}
|
2058 | 2025-03-01T00:12:00.544Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 3
reason = Dependency
|
2059 | 2025-03-01T00:12:00.578Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = dns_propagation_external
body = Some(Body)
dns_group = external
dns_server_url = http://[::1]:44469
generation = 2
method = PUT
servers = DnsServersList { addresses: [[::1]:44469] }
uri = http://[::1]:44469/config
|
2060 | 2025-03-01T00:12:00.579Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2061 | 2025-03-01T00:12:00.579Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2062 | 2025-03-01T00:12:00.579Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2063 | 2025-03-01T00:12:00.579Z | INFO | test_instance_serial (http): accepted connection
kind = dns
local_addr = [::1]:44469
remote_addr = [::1]:48014
|
2064 | 2025-03-01T00:12:00.580Z | TRAC | test_instance_serial (http): incoming request
kind = dns
local_addr = [::1]:44469
method = PUT
remote_addr = [::1]:48014
req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
uri = /config
|
2065 | 2025-03-01T00:12:00.581Z | INFO | test_instance_serial (store): attempting generation update
new_generation = 2
req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
|
2066 | 2025-03-01T00:12:00.581Z | INFO | test_instance_serial (store): pruning trees for generations newer than 0
|
2067 | 2025-03-01T00:12:00.581Z | DEBG | test_instance_serial (store): creating tree
tree_name = generation_2_zone_oxide-dev.test
|
2068 | 2025-03-01T00:12:00.582Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2069 | 2025-03-01T00:12:00.583Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2070 | 2025-03-01T00:12:00.583Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2071 | 2025-03-01T00:12:00.584Z | DEBG | test_instance_serial (store): updating current config
|
2072 | 2025-03-01T00:12:00.584Z | DEBG | test_instance_serial (store): flushing default tree
|
2073 | 2025-03-01T00:12:00.585Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e8eb7de-7bc8-420e-b305-8036ad331e2b", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2074 | 2025-03-01T00:12:00.585Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0
|
2075 | 2025-03-01T00:12:00.585Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2076 | 2025-03-01T00:12:00.585Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2077 | 2025-03-01T00:12:00.586Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2078 | 2025-03-01T00:12:00.586Z | INFO | test_instance_serial (store): pruning trees for generations older than 2
keep = 3
|
2079 | 2025-03-01T00:12:00.586Z | INFO | test_instance_serial (store): updated generation
new_generation = 2
req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
|
2080 | 2025-03-01T00:12:00.586Z | INFO | test_instance_serial (http): request completed
kind = dns
latency_us = 6061
local_addr = [::1]:44469
method = PUT
remote_addr = [::1]:48014
req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
response_code = 204
uri = /config
|
2081 | 2025-03-01T00:12:00.587Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:44469
generation = 2
result = Ok(Response { url: "http://[::1]:44469/config", status: 204, headers: {"x-request-id": "89f230c6-1fa9-4b44-8951-4f0304f3e1e9", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
servers = DnsServersList { addresses: [[::1]:44469] }
|
2082 | 2025-03-01T00:12:00.588Z | INFO | test_instance_serial (BackgroundTasks): DNS server now at generation 2
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:44469
generation = 2
servers = DnsServersList { addresses: [[::1]:44469] }
|
2083 | 2025-03-01T00:12:00.588Z | INFO | test_instance_serial (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_external
dns_group = external
generation = 2
servers = DnsServersList { addresses: [[::1]:44469] }
|
2084 | 2025-03-01T00:12:00.588Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 44.344658ms
iteration = 3
status = {"generation":2,"server_results":{"[::1]:44469":{"Ok":null}}}
|
2085 | 2025-03-01T00:12:00.589Z | INFO | test_instance_serial (BackgroundTasks): found Silo/DNS/TLS config (initial)
background_task = external_endpoints
config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-01T00:11:53.899134Z, time_modified: 2025-03-01T00:11:53.899134Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, db_silo: Silo { identity: SiloIdentity { id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-01T00:11:59.817794Z, time_modified: 2025-03-01T00:11:59.817794Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, db_silo: Silo { identity: SiloIdentity { id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-01T00:11:59.817794Z, time_modified: 2025-03-01T00:11:59.817794Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
|
2086 | 2025-03-01T00:12:00.590Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 269.309136ms
iteration = 2
status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"dc7acbaa-3bf5-44f0-bd58-7164e43b87a2","tls_certs":[]}},"default_endpoint":{"silo_id":"dc7acbaa-3bf5-44f0-bd58-7164e43b87a2","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo dc7acbaa-3bf5-44f0-bd58-7164e43b87a2 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
|
2087 | 2025-03-01T00:12:00.590Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
2088 | 2025-03-01T00:12:00.591Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2089 | 2025-03-01T00:12:00.591Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2090 | 2025-03-01T00:12:00.591Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2091 | 2025-03-01T00:12:00.591Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2092 | 2025-03-01T00:12:00.592Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "337dd776-b571-42c4-b219-fb45144526c0", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2093 | 2025-03-01T00:12:00.592Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1
|
2094 | 2025-03-01T00:12:00.593Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2095 | 2025-03-01T00:12:00.593Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2096 | 2025-03-01T00:12:00.594Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2097 | 2025-03-01T00:12:00.594Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2098 | 2025-03-01T00:12:00.595Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2099 | 2025-03-01T00:12:00.596Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2100 | 2025-03-01T00:12:00.596Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2101 | 2025-03-01T00:12:00.596Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2102 | 2025-03-01T00:12:00.596Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ec494ed-0deb-4d30-a0cd-f5a35d1fbd07", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2103 | 2025-03-01T00:12:00.596Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
2104 | 2025-03-01T00:12:00.598Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2105 | 2025-03-01T00:12:00.605Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
2106 | 2025-03-01T00:12:00.605Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
2107 | 2025-03-01T00:12:00.605Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2108 | 2025-03-01T00:12:00.605Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2109 | 2025-03-01T00:12:00.606Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2110 | 2025-03-01T00:12:00.606Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e02dd72-aa98-4226-923f-e0e3d4243a4d", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2111 | 2025-03-01T00:12:00.607Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
2112 | 2025-03-01T00:12:00.608Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2113 | 2025-03-01T00:12:00.608Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2114 | 2025-03-01T00:12:00.608Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2115 | 2025-03-01T00:12:00.609Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8932177-2fc2-4f9f-95d7-2f8bd8e64861", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2116 | 2025-03-01T00:12:00.610Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cmpa
|
2117 | 2025-03-01T00:12:00.610Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2118 | 2025-03-01T00:12:00.610Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2119 | 2025-03-01T00:12:00.610Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2120 | 2025-03-01T00:12:00.611Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "64897169-c537-4b73-8d74-17ad3193303c", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2121 | 2025-03-01T00:12:00.612Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
2122 | 2025-03-01T00:12:00.612Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2123 | 2025-03-01T00:12:00.612Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2124 | 2025-03-01T00:12:00.613Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2125 | 2025-03-01T00:12:00.613Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "811ea6aa-ca45-4245-8d33-b0f1bf4ba25a", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2126 | 2025-03-01T00:12:00.613Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
2127 | 2025-03-01T00:12:00.614Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "af08f718-17c4-4417-84d1-1128884bc60b", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2128 | 2025-03-01T00:12:00.615Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
|
2129 | 2025-03-01T00:12:00.615Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e4cf479e-20bb-454c-9318-974a1524491c", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2130 | 2025-03-01T00:12:00.616Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1
|
2131 | 2025-03-01T00:12:00.616Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
2132 | 2025-03-01T00:12:00.616Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2133 | 2025-03-01T00:12:00.616Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2134 | 2025-03-01T00:12:00.616Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2135 | 2025-03-01T00:12:00.617Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2136 | 2025-03-01T00:12:00.617Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cff79d47-5527-42fb-89bb-170fbb293a84", "content-length": "734", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2137 | 2025-03-01T00:12:00.618Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0
|
2138 | 2025-03-01T00:12:00.619Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2139 | 2025-03-01T00:12:00.620Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2140 | 2025-03-01T00:12:00.620Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2141 | 2025-03-01T00:12:00.620Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2142 | 2025-03-01T00:12:00.620Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "db57b303-f85e-4a2a-a9cb-b4ac7dd2a8cd", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2143 | 2025-03-01T00:12:00.620Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1
|
2144 | 2025-03-01T00:12:00.621Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2145 | 2025-03-01T00:12:00.622Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2146 | 2025-03-01T00:12:00.622Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2147 | 2025-03-01T00:12:00.622Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2148 | 2025-03-01T00:12:00.623Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2149 | 2025-03-01T00:12:00.630Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
2150 | 2025-03-01T00:12:00.630Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
2151 | 2025-03-01T00:12:00.630Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
2152 | 2025-03-01T00:12:00.630Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2153 | 2025-03-01T00:12:00.630Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2154 | 2025-03-01T00:12:00.630Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2155 | 2025-03-01T00:12:00.630Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2156 | 2025-03-01T00:12:00.631Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c5c6639a-34f7-4c00-b5b6-13380e40fe23", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2157 | 2025-03-01T00:12:00.632Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0
|
2158 | 2025-03-01T00:12:00.632Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2159 | 2025-03-01T00:12:00.632Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2160 | 2025-03-01T00:12:00.632Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2161 | 2025-03-01T00:12:00.633Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2162 | 2025-03-01T00:12:00.634Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "74746d9a-5ade-4e0e-a164-a16653cc44d3", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2163 | 2025-03-01T00:12:00.634Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1
|
2164 | 2025-03-01T00:12:00.634Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2165 | 2025-03-01T00:12:00.636Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2166 | 2025-03-01T00:12:00.636Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2167 | 2025-03-01T00:12:00.636Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2168 | 2025-03-01T00:12:00.637Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2169 | 2025-03-01T00:12:00.644Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
2170 | 2025-03-01T00:12:00.644Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2171 | 2025-03-01T00:12:00.644Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2172 | 2025-03-01T00:12:00.645Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2173 | 2025-03-01T00:12:00.645Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff994c5d-2c3e-4376-b5e2-f46fc28c2aa6", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2174 | 2025-03-01T00:12:00.645Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
2175 | 2025-03-01T00:12:00.647Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3525bdd-cad2-49e1-b2ba-fac7349e7ef3", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2176 | 2025-03-01T00:12:00.648Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
2177 | 2025-03-01T00:12:00.649Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2178 | 2025-03-01T00:12:00.650Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2179 | 2025-03-01T00:12:00.650Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2180 | 2025-03-01T00:12:00.651Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d507951a-754f-4747-bffc-ccce620cc5d0", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2181 | 2025-03-01T00:12:00.652Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cmpa
|
2182 | 2025-03-01T00:12:00.652Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2183 | 2025-03-01T00:12:00.652Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2184 | 2025-03-01T00:12:00.652Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2185 | 2025-03-01T00:12:00.656Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b03d1ee-eaa7-423b-a256-58945f431419", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2186 | 2025-03-01T00:12:00.656Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
2187 | 2025-03-01T00:12:00.656Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2188 | 2025-03-01T00:12:00.656Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2189 | 2025-03-01T00:12:00.657Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2190 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f8b5029c-ea5a-4cbb-a202-69f9ca215233", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2191 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
2192 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "268325dc-3bde-4193-9eef-06fc9558aa77", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2193 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
|
2194 | 2025-03-01T00:12:00.658Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2195 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2196 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2197 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "45b636fa-4d89-4322-a195-53ffef10763e", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2198 | 2025-03-01T00:12:00.658Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0
|
2199 | 2025-03-01T00:12:00.658Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
2200 | 2025-03-01T00:12:00.658Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2201 | 2025-03-01T00:12:00.659Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2202 | 2025-03-01T00:12:00.660Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2203 | 2025-03-01T00:12:00.660Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2204 | 2025-03-01T00:12:00.660Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8fd0b863-b1ef-43fd-8c85-0f50f43de181", "content-length": "723", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2205 | 2025-03-01T00:12:00.660Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0
|
2206 | 2025-03-01T00:12:00.661Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2207 | 2025-03-01T00:12:00.662Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2208 | 2025-03-01T00:12:00.662Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2209 | 2025-03-01T00:12:00.662Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2210 | 2025-03-01T00:12:00.663Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "118d8698-183d-4561-b059-1255c92b292c", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2211 | 2025-03-01T00:12:00.664Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1
|
2212 | 2025-03-01T00:12:00.664Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2213 | 2025-03-01T00:12:00.664Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2214 | 2025-03-01T00:12:00.664Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2215 | 2025-03-01T00:12:00.664Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2216 | 2025-03-01T00:12:00.665Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2217 | 2025-03-01T00:12:00.672Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
2218 | 2025-03-01T00:12:00.672Z | TRAC | test_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
2219 | 2025-03-01T00:12:00.672Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
2220 | 2025-03-01T00:12:00.672Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
2221 | 2025-03-01T00:12:00.672Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2222 | 2025-03-01T00:12:00.672Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2223 | 2025-03-01T00:12:00.673Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2224 | 2025-03-01T00:12:00.673Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b7ed24b7-10b3-4cca-9bab-68d09bd8e918", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2225 | 2025-03-01T00:12:00.674Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0
|
2226 | 2025-03-01T00:12:00.675Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
2227 | 2025-03-01T00:12:00.676Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2228 | 2025-03-01T00:12:00.676Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2229 | 2025-03-01T00:12:00.676Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2230 | 2025-03-01T00:12:00.677Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b5e4b53-f68b-47e1-8c9a-ce32e2b1cbd8", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2231 | 2025-03-01T00:12:00.677Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1
|
2232 | 2025-03-01T00:12:00.678Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2233 | 2025-03-01T00:12:00.678Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2234 | 2025-03-01T00:12:00.678Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2235 | 2025-03-01T00:12:00.678Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2236 | 2025-03-01T00:12:00.680Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2237 | 2025-03-01T00:12:00.687Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
2238 | 2025-03-01T00:12:00.688Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2239 | 2025-03-01T00:12:00.689Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2240 | 2025-03-01T00:12:00.689Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2241 | 2025-03-01T00:12:00.689Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8ebb1562-d4d1-4295-8bc9-fdb9170a23e9", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2242 | 2025-03-01T00:12:00.689Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
2243 | 2025-03-01T00:12:00.691Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9015f790-1a3b-47ec-b8d2-fb33af648834", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2244 | 2025-03-01T00:12:00.691Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
2245 | 2025-03-01T00:12:00.693Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "40a073c0-8181-41cb-bcf7-894d34fe35dc", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2246 | 2025-03-01T00:12:00.693Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cmpa
|
2247 | 2025-03-01T00:12:00.694Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3997aa01-8161-4a7b-9b0d-932654eec1a6", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2248 | 2025-03-01T00:12:00.694Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
2249 | 2025-03-01T00:12:00.694Z | DEBG | test_instance_serial (InternalApi): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("nexus"): [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("external-dns"): [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
2250 | 2025-03-01T00:12:00.695Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
|
2251 | 2025-03-01T00:12:00.695Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2252 | 2025-03-01T00:12:00.695Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2253 | 2025-03-01T00:12:00.695Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2254 | 2025-03-01T00:12:00.695Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2255 | 2025-03-01T00:12:00.696Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3f00786-fa68-4f56-a857-2866fddcc592", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2256 | 2025-03-01T00:12:00.697Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
2257 | 2025-03-01T00:12:00.697Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4d42e17e-4196-4945-8b2d-f8317be3938a", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2258 | 2025-03-01T00:12:00.697Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
|
2259 | 2025-03-01T00:12:00.699Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2260 | 2025-03-01T00:12:00.701Z | DEBG | test_instance_serial (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Fleet
result = Ok(())
|
2261 | 2025-03-01T00:12:00.701Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2262 | 2025-03-01T00:12:00.701Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2263 | 2025-03-01T00:12:00.702Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2264 | 2025-03-01T00:12:00.703Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1569b6ae-e9ab-46cf-8291-3aca0edaeb91", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2265 | 2025-03-01T00:12:00.703Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1
|
2266 | 2025-03-01T00:12:00.704Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b786d4f4-33c4-4d4f-9507-79939d34430e", "content-length": "723", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2267 | 2025-03-01T00:12:00.704Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0
|
2268 | 2025-03-01T00:12:00.704Z | TRAC | test_instance_serial (InternalApi): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-03-01T00:11:59.963399Z, allowed_ips: None }
|
2269 | 2025-03-01T00:12:00.704Z | DEBG | test_instance_serial (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
2270 | 2025-03-01T00:12:00.705Z | DEBG | test_instance_serial (InternalApi): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
|
2271 | 2025-03-01T00:12:00.706Z | DEBG | test_instance_serial (InternalApi): resolved 2 rules for sleds
|
2272 | 2025-03-01T00:12:00.707Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b59499f5-d923-467b-b01d-3e651d9dccca", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2273 | 2025-03-01T00:12:00.707Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1
|
2274 | 2025-03-01T00:12:00.709Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "43007899-cca6-4b88-a6d4-532eee40f261", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2275 | 2025-03-01T00:12:00.721Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0
|
2276 | 2025-03-01T00:12:00.739Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7bbc9bbe-d547-4827-aef0-a80200b18160", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2277 | 2025-03-01T00:12:00.742Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1
|
2278 | 2025-03-01T00:12:00.743Z | DEBG | test_instance_serial (InternalApi): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-01T00:11:55.931359Z, time_modified: 2025-03-01T00:11:55.931359Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(38105), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(34345) }]
|
2279 | 2025-03-01T00:12:00.743Z | DEBG | test_instance_serial (InternalApi): sending firewall rules to sled agents
|
2280 | 2025-03-01T00:12:00.743Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2281 | 2025-03-01T00:12:00.743Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2282 | 2025-03-01T00:12:00.744Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2283 | 2025-03-01T00:12:00.747Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1084d32e-b6c8-42a6-bed5-aa4b6e2c8789", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2284 | 2025-03-01T00:12:00.748Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
2285 | 2025-03-01T00:12:00.748Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
2286 | 2025-03-01T00:12:00.748Z | TRAC | test_instance_serial (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2287 | 2025-03-01T00:12:00.748Z | TRAC | test_instance_serial (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
|
2288 | 2025-03-01T00:12:00.748Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {} }
|
2289 | 2025-03-01T00:12:00.748Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Database
result = Ok(())
|
2290 | 2025-03-01T00:12:00.755Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e6f16be9-7e44-4a81-93cb-d501fc8cc989", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2291 | 2025-03-01T00:12:00.756Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
2292 | 2025-03-01T00:12:00.756Z | DEBG | test_instance_serial (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2293 | 2025-03-01T00:12:00.756Z | DEBG | test_instance_serial (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
2294 | 2025-03-01T00:12:00.795Z | DEBG | test_instance_serial (InternalApi): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2295 | 2025-03-01T00:12:00.796Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50038
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
2296 | 2025-03-01T00:12:00.797Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50038
req_id = 6cb9f174-a6b9-4beb-93c5-94992fd82272
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2297 | 2025-03-01T00:12:00.797Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 743
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50038
req_id = 6cb9f174-a6b9-4beb-93c5-94992fd82272
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
2298 | 2025-03-01T00:12:00.798Z | DEBG | test_instance_serial (InternalApi): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "6cb9f174-a6b9-4beb-93c5-94992fd82272", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2299 | 2025-03-01T00:12:00.799Z | INFO | test_instance_serial (InternalApi): updated firewall rules on 1 sleds
|
2300 | 2025-03-01T00:12:00.799Z | INFO | test_instance_serial (nexus): plumbed initial IP allowlist
|
2301 | 2025-03-01T00:12:00.840Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /
versions = all
|
2302 | 2025-03-01T00:12:00.840Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /access
versions = all
|
2303 | 2025-03-01T00:12:00.840Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /assets/{path}
versions = all
|
2304 | 2025-03-01T00:12:00.840Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /device/auth
versions = all
|
2305 | 2025-03-01T00:12:00.840Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /device/confirm
versions = all
|
2306 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /device/success
versions = all
|
2307 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /device/token
versions = all
|
2308 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /device/verify
versions = all
|
2309 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/probes
versions = all
|
2310 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /experimental/v1/probes
versions = all
|
2311 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
2312 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/probes/{probe}
versions = all
|
2313 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
2314 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
2315 | 2025-03-01T00:12:00.841Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /experimental/v1/system/support-bundles/{support_bundle}
versions = all
|
2316 | 2025-03-01T00:12:00.842Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}
versions = all
|
2317 | 2025-03-01T00:12:00.842Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/download
versions = all
|
2318 | 2025-03-01T00:12:00.842Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = HEAD
path = /experimental/v1/system/support-bundles/{support_bundle}/download
versions = all
|
2319 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file}
versions = all
|
2320 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = HEAD
path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file}
versions = all
|
2321 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/index
versions = all
|
2322 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /images
versions = all
|
2323 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /login
versions = all
|
2324 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /login/{silo_name}/local
versions = all
|
2325 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
2326 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
2327 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
2328 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /lookup/{path}
versions = all
|
2329 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /projects/{path}
versions = all
|
2330 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /projects-new
versions = all
|
2331 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /settings/{path}
versions = all
|
2332 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /system/{path}
versions = all
|
2333 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /utilization
versions = all
|
2334 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/certificates
versions = all
|
2335 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/certificates
versions = all
|
2336 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
2337 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/certificates/{certificate}
versions = all
|
2338 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/disks
versions = all
|
2339 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/disks
versions = all
|
2340 | 2025-03-01T00:12:00.843Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/disks/{disk}
versions = all
|
2341 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/disks/{disk}
versions = all
|
2342 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
2343 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
2344 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
2345 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
2346 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/disks/{disk}/metrics/{metric}
versions = all
|
2347 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/floating-ips
versions = all
|
2348 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/floating-ips
versions = all
|
2349 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
2350 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
2351 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
2352 | 2025-03-01T00:12:00.844Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
2353 | 2025-03-01T00:12:00.845Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
2354 | 2025-03-01T00:12:00.845Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/groups
versions = all
|
2355 | 2025-03-01T00:12:00.845Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/groups/{group_id}
versions = all
|
2356 | 2025-03-01T00:12:00.845Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/images
versions = all
|
2357 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/images
versions = all
|
2358 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/images/{image}
versions = all
|
2359 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/images/{image}
versions = all
|
2360 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/images/{image}/demote
versions = all
|
2361 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/images/{image}/promote
versions = all
|
2362 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances
versions = all
|
2363 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances
versions = all
|
2364 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/instances/{instance}
versions = all
|
2365 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}
versions = all
|
2366 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/instances/{instance}
versions = all
|
2367 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}/disks
versions = all
|
2368 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all
|
2369 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all
|
2370 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
2371 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
2372 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
2373 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
2374 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
2375 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
2376 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
2377 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/start
versions = all
|
2378 | 2025-03-01T00:12:00.846Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
2379 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
2380 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
2381 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
2382 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
2383 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
2384 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
2385 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/internet-gateways
versions = all
|
2386 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/internet-gateways
versions = all
|
2387 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
2388 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
2389 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/ip-pools
versions = all
|
2390 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/ip-pools/{pool}
versions = all
|
2391 | 2025-03-01T00:12:00.847Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
2392 | 2025-03-01T00:12:00.852Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/logout
versions = all
|
2393 | 2025-03-01T00:12:00.852Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/me
versions = all
|
2394 | 2025-03-01T00:12:00.852Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/me/groups
versions = all
|
2395 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/me/ssh-keys
versions = all
|
2396 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/me/ssh-keys
versions = all
|
2397 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
2398 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
2399 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
2400 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/network-interfaces
versions = all
|
2401 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/network-interfaces
versions = all
|
2402 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
2403 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/network-interfaces/{interface}
versions = all
|
2404 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/network-interfaces/{interface}
versions = all
|
2405 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/ping
versions = all
|
2406 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/policy
versions = all
|
2407 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/policy
versions = all
|
2408 | 2025-03-01T00:12:00.853Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/projects
versions = all
|
2409 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/projects
versions = all
|
2410 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/projects/{project}
versions = all
|
2411 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/projects/{project}
versions = all
|
2412 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/projects/{project}
versions = all
|
2413 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/projects/{project}/policy
versions = all
|
2414 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
2415 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/snapshots
versions = all
|
2416 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/snapshots
versions = all
|
2417 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
2418 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
2419 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/disks
versions = all
|
2420 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
2421 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
2422 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/racks
versions = all
|
2423 | 2025-03-01T00:12:00.854Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
2424 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/sleds
versions = all
|
2425 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/hardware/sleds
versions = all
|
2426 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
2427 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
2428 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
2429 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
2430 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
2431 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
2432 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
2433 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
2434 | 2025-03-01T00:12:00.855Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
2435 | 2025-03-01T00:12:00.856Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
2436 | 2025-03-01T00:12:00.856Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
2437 | 2025-03-01T00:12:00.856Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/switches
versions = all
|
2438 | 2025-03-01T00:12:00.856Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
2439 | 2025-03-01T00:12:00.856Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/identity-providers
versions = all
|
2440 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
2441 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
2442 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
2443 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
2444 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
2445 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools
versions = all
|
2446 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools
versions = all
|
2447 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
2448 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
2449 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
2450 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
2451 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
2452 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
2453 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
2454 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
2455 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
2456 | 2025-03-01T00:12:00.857Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
2457 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
2458 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools-service
versions = all
|
2459 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
2460 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
2461 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
2462 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
2463 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/address-lot
versions = all
|
2464 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/address-lot
versions = all
|
2465 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
2466 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
2467 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/allow-list
versions = all
|
2468 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
2469 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
2470 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
2471 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
2472 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
2473 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp
versions = all
|
2474 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/bgp
versions = all
|
2475 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
2476 | 2025-03-01T00:12:00.858Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
2477 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
2478 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
2479 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
2480 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
2481 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
2482 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/bgp-status
versions = all
|
2483 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
2484 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
2485 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
2486 | 2025-03-01T00:12:00.859Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
2487 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
2488 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
2489 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
2490 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/policy
versions = all
|
2491 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/policy
versions = all
|
2492 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/roles
versions = all
|
2493 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/roles/{role_name}
versions = all
|
2494 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silo-quotas
versions = all
|
2495 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silos
versions = all
|
2496 | 2025-03-01T00:12:00.860Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/silos
versions = all
|
2497 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
2498 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silos/{silo}
versions = all
|
2499 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all
|
2500 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
2501 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
2502 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
2503 | 2025-03-01T00:12:00.861Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
2504 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/system/timeseries/query
versions = all
|
2505 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
2506 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/system/update/repository
versions = all
|
2507 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/update/repository/{system_version}
versions = all
|
2508 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/users
versions = all
|
2509 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/users/{user_id}
versions = all
|
2510 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/users-builtin
versions = all
|
2511 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
2512 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/utilization/silos
versions = all
|
2513 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
2514 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/timeseries/query
versions = all
|
2515 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/users
versions = all
|
2516 | 2025-03-01T00:12:00.862Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/utilization
versions = all
|
2517 | 2025-03-01T00:12:00.863Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
2518 | 2025-03-01T00:12:00.863Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
2519 | 2025-03-01T00:12:00.863Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-router-routes
versions = all
|
2520 | 2025-03-01T00:12:00.863Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/vpc-router-routes
versions = all
|
2521 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
2522 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
2523 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
2524 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-routers
versions = all
|
2525 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/vpc-routers
versions = all
|
2526 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
2527 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
2528 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
2529 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-subnets
versions = all
|
2530 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/vpc-subnets
versions = all
|
2531 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
2532 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
2533 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
2534 | 2025-03-01T00:12:00.864Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all
|
2535 | 2025-03-01T00:12:00.865Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpcs
versions = all
|
2536 | 2025-03-01T00:12:00.865Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = POST
path = /v1/vpcs
versions = all
|
2537 | 2025-03-01T00:12:00.866Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
2538 | 2025-03-01T00:12:00.866Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
2539 | 2025-03-01T00:12:00.866Z | DEBG | test_instance_serial (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43509
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
2540 | 2025-03-01T00:12:00.866Z | INFO | test_instance_serial (dropshot_external): listening
local_addr = 127.0.0.1:43509
|
2541 | 2025-03-01T00:12:00.866Z | DEBG | test_instance_serial (dropshot_external): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:43509
|
2542 | 2025-03-01T00:12:00.912Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /
versions = all
|
2543 | 2025-03-01T00:12:00.913Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /access
versions = all
|
2544 | 2025-03-01T00:12:00.913Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /assets/{path}
versions = all
|
2545 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /device/auth
versions = all
|
2546 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /device/confirm
versions = all
|
2547 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /device/success
versions = all
|
2548 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /device/token
versions = all
|
2549 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /device/verify
versions = all
|
2550 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/probes
versions = all
|
2551 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /experimental/v1/probes
versions = all
|
2552 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
2553 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/probes/{probe}
versions = all
|
2554 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
2555 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
2556 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /experimental/v1/system/support-bundles/{support_bundle}
versions = all
|
2557 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}
versions = all
|
2558 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/download
versions = all
|
2559 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = HEAD
path = /experimental/v1/system/support-bundles/{support_bundle}/download
versions = all
|
2560 | 2025-03-01T00:12:00.914Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file}
versions = all
|
2561 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = HEAD
path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file}
versions = all
|
2562 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /experimental/v1/system/support-bundles/{support_bundle}/index
versions = all
|
2563 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /images
versions = all
|
2564 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /login
versions = all
|
2565 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /login/{silo_name}/local
versions = all
|
2566 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
2567 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
2568 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
2569 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /lookup/{path}
versions = all
|
2570 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /projects/{path}
versions = all
|
2571 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /projects-new
versions = all
|
2572 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /settings/{path}
versions = all
|
2573 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /system/{path}
versions = all
|
2574 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /utilization
versions = all
|
2575 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/certificates
versions = all
|
2576 | 2025-03-01T00:12:00.915Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/certificates
versions = all
|
2577 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
2578 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/certificates/{certificate}
versions = all
|
2579 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/disks
versions = all
|
2580 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/disks
versions = all
|
2581 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/disks/{disk}
versions = all
|
2582 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/disks/{disk}
versions = all
|
2583 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
2584 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
2585 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
2586 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
2587 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/disks/{disk}/metrics/{metric}
versions = all
|
2588 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/floating-ips
versions = all
|
2589 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/floating-ips
versions = all
|
2590 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
2591 | 2025-03-01T00:12:00.916Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
2592 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
2593 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
2594 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
2595 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/groups
versions = all
|
2596 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/groups/{group_id}
versions = all
|
2597 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/images
versions = all
|
2598 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/images
versions = all
|
2599 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/images/{image}
versions = all
|
2600 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/images/{image}
versions = all
|
2601 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/images/{image}/demote
versions = all
|
2602 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/images/{image}/promote
versions = all
|
2603 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances
versions = all
|
2604 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances
versions = all
|
2605 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/instances/{instance}
versions = all
|
2606 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}
versions = all
|
2607 | 2025-03-01T00:12:00.917Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/instances/{instance}
versions = all
|
2608 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}/disks
versions = all
|
2609 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all
|
2610 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all
|
2611 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
2612 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
2613 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
2614 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
2615 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
2616 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
2617 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
2618 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/start
versions = all
|
2619 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
2620 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
2621 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
2622 | 2025-03-01T00:12:00.918Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
2623 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
2624 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
2625 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
2626 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/internet-gateways
versions = all
|
2627 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/internet-gateways
versions = all
|
2628 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
2629 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
2630 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/ip-pools
versions = all
|
2631 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/ip-pools/{pool}
versions = all
|
2632 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
2633 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/logout
versions = all
|
2634 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/me
versions = all
|
2635 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/me/groups
versions = all
|
2636 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/me/ssh-keys
versions = all
|
2637 | 2025-03-01T00:12:00.919Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/me/ssh-keys
versions = all
|
2638 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
2639 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
2640 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
2641 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/network-interfaces
versions = all
|
2642 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/network-interfaces
versions = all
|
2643 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
2644 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/network-interfaces/{interface}
versions = all
|
2645 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/network-interfaces/{interface}
versions = all
|
2646 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/ping
versions = all
|
2647 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/policy
versions = all
|
2648 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/policy
versions = all
|
2649 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/projects
versions = all
|
2650 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/projects
versions = all
|
2651 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/projects/{project}
versions = all
|
2652 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/projects/{project}
versions = all
|
2653 | 2025-03-01T00:12:00.920Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/projects/{project}
versions = all
|
2654 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/projects/{project}/policy
versions = all
|
2655 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
2656 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/snapshots
versions = all
|
2657 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/snapshots
versions = all
|
2658 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
2659 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
2660 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/disks
versions = all
|
2661 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
2662 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
2663 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/racks
versions = all
|
2664 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
2665 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/sleds
versions = all
|
2666 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/hardware/sleds
versions = all
|
2667 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
2668 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
2669 | 2025-03-01T00:12:00.921Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
2670 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
2671 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
2672 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
2673 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
2674 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
2675 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
2676 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
2677 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
2678 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/switches
versions = all
|
2679 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
2680 | 2025-03-01T00:12:00.922Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/identity-providers
versions = all
|
2681 | 2025-03-01T00:12:00.923Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
2682 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
2683 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
2684 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
2685 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
2686 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools
versions = all
|
2687 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools
versions = all
|
2688 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
2689 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
2690 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
2691 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
2692 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
2693 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
2694 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
2695 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
2696 | 2025-03-01T00:12:00.924Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
2697 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
2698 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
2699 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools-service
versions = all
|
2700 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
2701 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
2702 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
2703 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
2704 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/address-lot
versions = all
|
2705 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/address-lot
versions = all
|
2706 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
2707 | 2025-03-01T00:12:00.925Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
2708 | 2025-03-01T00:12:00.927Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/allow-list
versions = all
|
2709 | 2025-03-01T00:12:00.927Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
2710 | 2025-03-01T00:12:00.927Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
2711 | 2025-03-01T00:12:00.927Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
2712 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
2713 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
2714 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp
versions = all
|
2715 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/bgp
versions = all
|
2716 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
2717 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
2718 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
2719 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
2720 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
2721 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
2722 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
2723 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/bgp-status
versions = all
|
2724 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
2725 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
2726 | 2025-03-01T00:12:00.928Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
2727 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
2728 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
2729 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
2730 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
2731 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/policy
versions = all
|
2732 | 2025-03-01T00:12:00.929Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/policy
versions = all
|
2733 | 2025-03-01T00:12:00.931Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/roles
versions = all
|
2734 | 2025-03-01T00:12:00.932Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/roles/{role_name}
versions = all
|
2735 | 2025-03-01T00:12:00.932Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silo-quotas
versions = all
|
2736 | 2025-03-01T00:12:00.932Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silos
versions = all
|
2737 | 2025-03-01T00:12:00.932Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/silos
versions = all
|
2738 | 2025-03-01T00:12:00.932Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
2739 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silos/{silo}
versions = all
|
2740 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all
|
2741 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
2742 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
2743 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
2744 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
2745 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/system/timeseries/query
versions = all
|
2746 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
2747 | 2025-03-01T00:12:00.933Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/system/update/repository
versions = all
|
2748 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/update/repository/{system_version}
versions = all
|
2749 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/users
versions = all
|
2750 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/users/{user_id}
versions = all
|
2751 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/users-builtin
versions = all
|
2752 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
2753 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/utilization/silos
versions = all
|
2754 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
2755 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/timeseries/query
versions = all
|
2756 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/users
versions = all
|
2757 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/utilization
versions = all
|
2758 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
2759 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
2760 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-router-routes
versions = all
|
2761 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/vpc-router-routes
versions = all
|
2762 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
2763 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
2764 | 2025-03-01T00:12:00.934Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
2765 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-routers
versions = all
|
2766 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/vpc-routers
versions = all
|
2767 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
2768 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
2769 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
2770 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-subnets
versions = all
|
2771 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/vpc-subnets
versions = all
|
2772 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
2773 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
2774 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
2775 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all
|
2776 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpcs
versions = all
|
2777 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = POST
path = /v1/vpcs
versions = all
|
2778 | 2025-03-01T00:12:00.935Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
2779 | 2025-03-01T00:12:00.936Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
2780 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:45441
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
2781 | 2025-03-01T00:12:00.937Z | INFO | test_instance_serial (dropshot_external_techport): listening
local_addr = 127.0.0.1:45441
|
2782 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (dropshot_external_techport): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:45441
|
2783 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (nexus-producer-server): registered DTrace probes
|
2784 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = 127.0.0.1:43677
method = GET
path = /{producer_id}
versions = all
|
2785 | 2025-03-01T00:12:00.937Z | INFO | test_instance_serial (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:328
local_addr = 127.0.0.1:43677
|
2786 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (dropshot): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:43677
|
2787 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:43677
|
2788 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (nexus-producer-server): Nexus IP provided explicitly, will use it
addr = 127.0.0.1:41715
|
2789 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (nexus-producer-server): starting producer registration task
|
2790 | 2025-03-01T00:12:00.937Z | INFO | test_instance_serial (nexus-producer-server): starting oximeter metric producer server
address = 127.0.0.1:43677
file = oximeter/producer/src/lib.rs:279
interval = 10s
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
2791 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (init_with_steps): Running step start_oximeter
|
2792 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial: Starting Oximeter
|
2793 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (oximeter): registered DTrace probes
|
2794 | 2025-03-01T00:12:00.937Z | INFO | test_instance_serial (oximeter): starting oximeter server
file = oximeter/collector/src/lib.rs:236
|
2795 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (oximeter): creating ClickHouse client
|
2796 | 2025-03-01T00:12:00.937Z | DEBG | test_instance_serial (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2797 | 2025-03-01T00:12:00.938Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
2798 | 2025-03-01T00:12:00.938Z | DEBG | test_instance_serial (producer-registration-task): registering / renewing oximeter producer lease with Nexus
|
2799 | 2025-03-01T00:12:00.938Z | DEBG | test_instance_serial (producer-registration-task): using nexus address for registration
addr = 127.0.0.1:41715
|
2800 | 2025-03-01T00:12:00.969Z | DEBG | test_instance_serial (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:41715/metrics/producers
|
2801 | 2025-03-01T00:12:00.970Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42648
|
2802 | 2025-03-01T00:12:00.971Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42648
req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4
uri = /metrics/producers
|
2803 | 2025-03-01T00:12:00.971Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42648
req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4
resource = Database
uri = /metrics/producers
|
2804 | 2025-03-01T00:12:00.972Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42648
req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
2805 | 2025-03-01T00:12:00.972Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42648
req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4
resource = Database
result = Ok(())
uri = /metrics/producers
|
2806 | 2025-03-01T00:12:00.973Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e4ce484-784d-4a10-b205-89091dd9b6e0", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2807 | 2025-03-01T00:12:00.974Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cmpa
|
2808 | 2025-03-01T00:12:00.975Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9dc5aba9-dc4f-4f04-a418-42a049df1a3b", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2809 | 2025-03-01T00:12:00.975Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
2810 | 2025-03-01T00:12:00.978Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b91cbf85-90a6-4dc6-b85c-2635ad3919d7", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2811 | 2025-03-01T00:12:00.978Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
2812 | 2025-03-01T00:12:00.980Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1fadde1-a8b7-4e81-acdc-b50cb4ee8b1f", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2813 | 2025-03-01T00:12:00.981Z | DEBG | test_instance_serial (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:39563
method = GET
uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
|
2814 | 2025-03-01T00:12:00.981Z | WARN | test_instance_serial (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:823
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2815 | 2025-03-01T00:12:00.981Z | DEBG | test_instance_serial (oximeter-agent): oximeter database does not exist, creating
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
2816 | 2025-03-01T00:12:00.981Z | INFO | test_instance_serial (clickhouse-client): reading db version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:732
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2817 | 2025-03-01T00:12:00.981Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
2818 | 2025-03-01T00:12:00.983Z | DEBG | test_instance_serial (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:39563
result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9254ec8-8578-4415-8fed-4770b70f12f3", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2819 | 2025-03-01T00:12:00.984Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
2820 | 2025-03-01T00:12:00.984Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2821 | 2025-03-01T00:12:00.984Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2822 | 2025-03-01T00:12:00.984Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2823 | 2025-03-01T00:12:00.984Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2824 | 2025-03-01T00:12:00.984Z | WARN | test_instance_serial (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:823
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2825 | 2025-03-01T00:12:00.984Z | INFO | test_instance_serial (clickhouse-client): read oximeter database version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:736
id = 46c7197b-e099-494b-a693-296ecb919b0c
version = 0
|
2826 | 2025-03-01T00:12:00.984Z | INFO | test_instance_serial (clickhouse-client): wiping and re-initializing oximeter schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:741
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2827 | 2025-03-01T00:12:00.985Z | DEBG | test_instance_serial (clickhouse-client): wiping ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2828 | 2025-03-01T00:12:00.986Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = DROP DATABASE IF EXISTS oximeter
|
2829 | 2025-03-01T00:12:00.986Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2830 | 2025-03-01T00:12:00.989Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
2831 | 2025-03-01T00:12:00.990Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
|
2832 | 2025-03-01T00:12:00.990Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2833 | 2025-03-01T00:12:00.990Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2834 | 2025-03-01T00:12:00.990Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2835 | 2025-03-01T00:12:00.990Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2836 | 2025-03-01T00:12:00.990Z | DEBG | test_instance_serial (clickhouse-client): initializing ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
2837 | 2025-03-01T00:12:00.990Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = CREATE DATABASE IF NOT EXISTS oximeter
|
2838 | 2025-03-01T00:12:00.992Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2839 | 2025-03-01T00:12:00.996Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
2840 | 2025-03-01T00:12:00.996Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2841 | 2025-03-01T00:12:00.996Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2842 | 2025-03-01T00:12:00.997Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2843 | 2025-03-01T00:12:01.000Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
|
2844 | 2025-03-01T00:12:01.022Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2845 | 2025-03-01T00:12:01.043Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2846 | 2025-03-01T00:12:01.056Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2847 | 2025-03-01T00:12:01.067Z | INFO | test_instance_serial (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 94001
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42648
req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4
response_code = 503
uri = /metrics/producers
|
2848 | 2025-03-01T00:12:01.067Z | DEBG | test_instance_serial (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "892979d7-d9da-4c80-b5b2-67c29f7a13a4", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2849 | 2025-03-01T00:12:01.067Z | WARN | test_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry
delay = 250.833232ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"892979d7-d9da-4c80-b5b2-67c29f7a13a4\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:00 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"892979d7-d9da-4c80-b5b2-67c29f7a13a4\\" }"
file = oximeter/producer/src/lib.rs:420
|
2850 | 2025-03-01T00:12:01.073Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2851 | 2025-03-01T00:12:01.086Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2852 | 2025-03-01T00:12:01.095Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2853 | 2025-03-01T00:12:01.121Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2854 | 2025-03-01T00:12:01.181Z | DEBG | test_instance_serial (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:38105
|
2855 | 2025-03-01T00:12:01.185Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = http://[::1]:38105
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:38105/inventory
|
2856 | 2025-03-01T00:12:01.188Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2857 | 2025-03-01T00:12:01.189Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50040
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
2858 | 2025-03-01T00:12:01.192Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50040
req_id = 1d62854f-d8b0-4137-99ce-3cb1191e4242
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
2859 | 2025-03-01T00:12:01.194Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 2043
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50040
req_id = 1d62854f-d8b0-4137-99ce-3cb1191e4242
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
2860 | 2025-03-01T00:12:01.195Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = http://[::1]:38105
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:38105/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "1d62854f-d8b0-4137-99ce-3cb1191e4242", "content-length": "2517", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
|
2861 | 2025-03-01T00:12:01.200Z | DEBG | test_instance_serial (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
2862 | 2025-03-01T00:12:01.200Z | DEBG | test_instance_serial (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
2863 | 2025-03-01T00:12:01.200Z | DEBG | test_instance_serial (BackgroundTasks): finished collection
background_task = inventory_collection
|
2864 | 2025-03-01T00:12:01.206Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
|
2865 | 2025-03-01T00:12:01.209Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2866 | 2025-03-01T00:12:01.209Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2867 | 2025-03-01T00:12:01.209Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2868 | 2025-03-01T00:12:01.209Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2869 | 2025-03-01T00:12:01.210Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2870 | 2025-03-01T00:12:01.211Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
2871 | 2025-03-01T00:12:01.216Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
2872 | 2025-03-01T00:12:01.217Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
|
2873 | 2025-03-01T00:12:01.233Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
2874 | 2025-03-01T00:12:01.234Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
2875 | 2025-03-01T00:12:01.248Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2876 | 2025-03-01T00:12:01.261Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2877 | 2025-03-01T00:12:01.273Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2878 | 2025-03-01T00:12:01.288Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2879 | 2025-03-01T00:12:01.302Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2880 | 2025-03-01T00:12:01.461Z | DEBG | test_instance_serial (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:41715/metrics/producers
|
2881 | 2025-03-01T00:12:01.461Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2882 | 2025-03-01T00:12:01.461Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42650
|
2883 | 2025-03-01T00:12:01.464Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42650
req_id = 992da154-d0b9-4297-854d-df8c5208b58d
uri = /metrics/producers
|
2884 | 2025-03-01T00:12:01.466Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42650
req_id = 992da154-d0b9-4297-854d-df8c5208b58d
resource = Database
uri = /metrics/producers
|
2885 | 2025-03-01T00:12:01.468Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42650
req_id = 992da154-d0b9-4297-854d-df8c5208b58d
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
2886 | 2025-03-01T00:12:01.469Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42650
req_id = 992da154-d0b9-4297-854d-df8c5208b58d
resource = Database
result = Ok(())
uri = /metrics/producers
|
2887 | 2025-03-01T00:12:01.473Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2888 | 2025-03-01T00:12:01.477Z | INFO | test_instance_serial (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 12871
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42650
req_id = 992da154-d0b9-4297-854d-df8c5208b58d
response_code = 503
uri = /metrics/producers
|
2889 | 2025-03-01T00:12:01.479Z | DEBG | test_instance_serial (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "992da154-d0b9-4297-854d-df8c5208b58d", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:01 GMT"} })
|
2890 | 2025-03-01T00:12:01.479Z | WARN | test_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry
delay = 344.383643ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"992da154-d0b9-4297-854d-df8c5208b58d\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:01 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"992da154-d0b9-4297-854d-df8c5208b58d\\" }"
file = oximeter/producer/src/lib.rs:420
|
2891 | 2025-03-01T00:12:01.490Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2892 | 2025-03-01T00:12:01.503Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2893 | 2025-03-01T00:12:01.521Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2894 | 2025-03-01T00:12:01.534Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2895 | 2025-03-01T00:12:01.548Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2896 | 2025-03-01T00:12:01.573Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2897 | 2025-03-01T00:12:01.591Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2898 | 2025-03-01T00:12:01.612Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2899 | 2025-03-01T00:12:01.625Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2900 | 2025-03-01T00:12:01.644Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2901 | 2025-03-01T00:12:01.660Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
2902 | 2025-03-01T00:12:01.674Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2903 | 2025-03-01T00:12:01.688Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2904 | 2025-03-01T00:12:01.704Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2905 | 2025-03-01T00:12:01.725Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2906 | 2025-03-01T00:12:01.742Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2907 | 2025-03-01T00:12:01.768Z | INFO | test_instance_serial (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = d27b7f2c-fd67-458f-9375-8bd050b3b83a
|
2908 | 2025-03-01T00:12:01.768Z | DEBG | test_instance_serial (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = d27b7f2c-fd67-458f-9375-8bd050b3b83a
time_started = 2025-03-01 00:12:00.447452 UTC
|
2909 | 2025-03-01T00:12:01.768Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 1.447276113s
iteration = 3
status = {"collection_id":"d27b7f2c-fd67-458f-9375-8bd050b3b83a","time_done":"2025-03-01 00:12:01.200219 UTC","time_started":"2025-03-01 00:12:00.447452 UTC"}
|
2910 | 2025-03-01T00:12:01.778Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 3
reason = Dependency
|
2911 | 2025-03-01T00:12:01.778Z | WARN | test_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
2912 | 2025-03-01T00:12:01.778Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 67.261\u{b5}s
iteration = 3
status = {"error":"no blueprint"}
|
2913 | 2025-03-01T00:12:01.778Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 3
reason = Dependency
|
2914 | 2025-03-01T00:12:01.778Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 13.83\u{b5}s
iteration = 3
status = {"error":"task disabled"}
|
2915 | 2025-03-01T00:12:01.778Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2916 | 2025-03-01T00:12:01.821Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2917 | 2025-03-01T00:12:01.975Z | DEBG | test_instance_serial (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:41715/metrics/producers
|
2918 | 2025-03-01T00:12:01.988Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2919 | 2025-03-01T00:12:01.988Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42652
|
2920 | 2025-03-01T00:12:01.989Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42652
req_id = d2de0b00-210e-4049-aad7-9238b4932296
uri = /metrics/producers
|
2921 | 2025-03-01T00:12:01.989Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42652
req_id = d2de0b00-210e-4049-aad7-9238b4932296
resource = Database
uri = /metrics/producers
|
2922 | 2025-03-01T00:12:01.989Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42652
req_id = d2de0b00-210e-4049-aad7-9238b4932296
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
2923 | 2025-03-01T00:12:01.990Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42652
req_id = d2de0b00-210e-4049-aad7-9238b4932296
resource = Database
result = Ok(())
uri = /metrics/producers
|
2924 | 2025-03-01T00:12:01.997Z | INFO | test_instance_serial (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 8205
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42652
req_id = d2de0b00-210e-4049-aad7-9238b4932296
response_code = 503
uri = /metrics/producers
|
2925 | 2025-03-01T00:12:01.999Z | DEBG | test_instance_serial (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "d2de0b00-210e-4049-aad7-9238b4932296", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:01 GMT"} })
|
2926 | 2025-03-01T00:12:01.999Z | WARN | test_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry
delay = 925.564303ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"d2de0b00-210e-4049-aad7-9238b4932296\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:01 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"d2de0b00-210e-4049-aad7-9238b4932296\\" }"
file = oximeter/producer/src/lib.rs:420
|
2927 | 2025-03-01T00:12:02.021Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2928 | 2025-03-01T00:12:02.031Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2929 | 2025-03-01T00:12:02.042Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2930 | 2025-03-01T00:12:02.054Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
2931 | 2025-03-01T00:12:02.066Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
|
2932 | 2025-03-01T00:12:02.084Z | INFO | test_instance_serial (clickhouse-client): inserting current version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:764
id = 46c7197b-e099-494b-a693-296ecb919b0c
version = 13
|
2933 | 2025-03-01T00:12:02.084Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = INSERT INTO oximeter.version (*) VALUES (13, now());
|
2934 | 2025-03-01T00:12:02.088Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:32909
method = GET
path = /info
versions = all
|
2935 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:32909
method = GET
path = /producers
versions = all
|
2936 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:32909
method = DELETE
path = /producers/{producer_id}
versions = all
|
2937 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:32909
method = GET
path = /producers/{producer_id}
versions = all
|
2938 | 2025-03-01T00:12:02.089Z | INFO | test_instance_serial (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:328
local_addr = [::1]:32909
|
2939 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:32909
|
2940 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (oximeter): registered USDT probes
|
2941 | 2025-03-01T00:12:02.089Z | DEBG | test_instance_serial (oximeter): contacting nexus
|
2942 | 2025-03-01T00:12:02.565Z | DEBG | test_instance_serial (oximeter): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:41715/metrics/collectors
|
2943 | 2025-03-01T00:12:02.565Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42654
|
2944 | 2025-03-01T00:12:02.566Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42654
req_id = 21944226-275f-424f-b419-5519f5586a74
uri = /metrics/collectors
|
2945 | 2025-03-01T00:12:02.566Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42654
req_id = 21944226-275f-424f-b419-5519f5586a74
resource = Database
uri = /metrics/collectors
|
2946 | 2025-03-01T00:12:02.579Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42654
req_id = 21944226-275f-424f-b419-5519f5586a74
roles = RoleSet { roles: {} }
uri = /metrics/collectors
|
2947 | 2025-03-01T00:12:02.580Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42654
req_id = 21944226-275f-424f-b419-5519f5586a74
resource = Database
result = Ok(())
uri = /metrics/collectors
|
2948 | 2025-03-01T00:12:02.587Z | INFO | test_instance_serial (nexus): registered new oximeter metric collection server
address = [::1]:32909
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
2949 | 2025-03-01T00:12:02.587Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 21683
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42654
req_id = 21944226-275f-424f-b419-5519f5586a74
response_code = 204
uri = /metrics/collectors
|
2950 | 2025-03-01T00:12:02.588Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors", status: 204, headers: {"x-request-id": "21944226-275f-424f-b419-5519f5586a74", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
|
2951 | 2025-03-01T00:12:02.588Z | INFO | test_instance_serial (oximeter): oximeter registered with nexus
file = oximeter/collector/src/lib.rs:383
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
2952 | 2025-03-01T00:12:02.588Z | DEBG | test_instance_serial (init_with_steps): Running step start_producer_server
|
2953 | 2025-03-01T00:12:02.588Z | DEBG | test_instance_serial: Starting test metric Producer Server
|
2954 | 2025-03-01T00:12:02.589Z | INFO | test_instance_serial: Starting mock propolis-server...
|
2955 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = GET
path = /instance
|
2956 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = PUT
path = /instance
|
2957 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = GET
path = /instance/serial
|
2958 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = GET
path = /instance/serial/history
|
2959 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = PUT
path = /instance/state
|
2960 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): registered endpoint
local_addr = [::1]:36473
method = GET
path = /instance/state-monitor
|
2961 | 2025-03-01T00:12:02.590Z | INFO | test_instance_serial (dropshot): listening
local_addr = [::1]:36473
|
2962 | 2025-03-01T00:12:02.590Z | DEBG | test_instance_serial (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:36473
|
2963 | 2025-03-01T00:12:02.643Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/system/ip-pools
|
2964 | 2025-03-01T00:12:02.644Z | INFO | test_instance_serial (oximeter-agent): starting refresh list task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:471
|
2965 | 2025-03-01T00:12:02.683Z | INFO | test_instance_serial (dropshot_external): accepted connection
local_addr = 127.0.0.1:43509
remote_addr = 127.0.0.1:54780
|
2966 | 2025-03-01T00:12:02.683Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42656
|
2967 | 2025-03-01T00:12:02.683Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
2968 | 2025-03-01T00:12:02.684Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
2969 | 2025-03-01T00:12:02.684Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42656
req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd
uri = /metrics/producers
|
2970 | 2025-03-01T00:12:02.684Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = c0091c1c-938e-4a45-9d40-c398f5591267
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
2971 | 2025-03-01T00:12:02.685Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42656
req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd
resource = Database
uri = /metrics/producers
|
2972 | 2025-03-01T00:12:02.685Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42656
req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
2973 | 2025-03-01T00:12:02.686Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42656
req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd
resource = Database
result = Ok(())
uri = /metrics/producers
|
2974 | 2025-03-01T00:12:02.686Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = c0091c1c-938e-4a45-9d40-c398f5591267
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
2975 | 2025-03-01T00:12:02.686Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = c0091c1c-938e-4a45-9d40-c398f5591267
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
2976 | 2025-03-01T00:12:02.693Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = c0091c1c-938e-4a45-9d40-c398f5591267
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
2977 | 2025-03-01T00:12:02.693Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
uri = /v1/system/ip-pools
|
2978 | 2025-03-01T00:12:02.693Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
uri = /v1/system/ip-pools
|
2979 | 2025-03-01T00:12:02.693Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools
|
2980 | 2025-03-01T00:12:02.693Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
2981 | 2025-03-01T00:12:02.693Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
2982 | 2025-03-01T00:12:02.693Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
2983 | 2025-03-01T00:12:02.694Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
2984 | 2025-03-01T00:12:02.697Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
2985 | 2025-03-01T00:12:02.697Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
2986 | 2025-03-01T00:12:02.697Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
2987 | 2025-03-01T00:12:02.697Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
2988 | 2025-03-01T00:12:02.697Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
2989 | 2025-03-01T00:12:02.697Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
2990 | 2025-03-01T00:12:02.698Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
2991 | 2025-03-01T00:12:02.700Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
2992 | 2025-03-01T00:12:02.700Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
2993 | 2025-03-01T00:12:02.700Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
2994 | 2025-03-01T00:12:02.701Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
2995 | 2025-03-01T00:12:02.703Z | INFO | test_instance_serial (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
2996 | 2025-03-01T00:12:02.703Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 19050
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42656
req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd
response_code = 201
uri = /metrics/producers
|
2997 | 2025-03-01T00:12:02.705Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
2998 | 2025-03-01T00:12:02.708Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
2999 | 2025-03-01T00:12:02.708Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3000 | 2025-03-01T00:12:02.708Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3001 | 2025-03-01T00:12:02.709Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3002 | 2025-03-01T00:12:02.709Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 25042
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = c0091c1c-938e-4a45-9d40-c398f5591267
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3003 | 2025-03-01T00:12:02.710Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0091c1c-938e-4a45-9d40-c398f5591267", "content-length": "281", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
|
3004 | 2025-03-01T00:12:02.711Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3005 | 2025-03-01T00:12:02.711Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3006 | 2025-03-01T00:12:02.712Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3007 | 2025-03-01T00:12:02.712Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3008 | 2025-03-01T00:12:02.712Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3009 | 2025-03-01T00:12:02.712Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3010 | 2025-03-01T00:12:02.712Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3011 | 2025-03-01T00:12:02.713Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3012 | 2025-03-01T00:12:02.714Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3013 | 2025-03-01T00:12:02.714Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3014 | 2025-03-01T00:12:02.714Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3015 | 2025-03-01T00:12:02.714Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3016 | 2025-03-01T00:12:02.714Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3017 | 2025-03-01T00:12:02.715Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3018 | 2025-03-01T00:12:02.719Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 6671
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3019 | 2025-03-01T00:12:02.720Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "5148cdb8-378f-4879-b6c2-b400a86a2dc6", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
|
3020 | 2025-03-01T00:12:02.721Z | DEBG | test_instance_serial (oximeter-agent): registered new metric producer
address = [::1]:44275
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3021 | 2025-03-01T00:12:02.768Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3022 | 2025-03-01T00:12:02.770Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3023 | 2025-03-01T00:12:02.772Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3024 | 2025-03-01T00:12:02.772Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
uri = /v1/system/ip-pools
|
3025 | 2025-03-01T00:12:02.772Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = IpPoolList
uri = /v1/system/ip-pools
|
3026 | 2025-03-01T00:12:02.772Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools
|
3027 | 2025-03-01T00:12:02.772Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = Database
uri = /v1/system/ip-pools
|
3028 | 2025-03-01T00:12:02.772Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools
|
3029 | 2025-03-01T00:12:02.773Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = Database
result = Ok(())
uri = /v1/system/ip-pools
|
3030 | 2025-03-01T00:12:02.778Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 1
n_pruned_tasks = 0
|
3031 | 2025-03-01T00:12:02.791Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools
|
3032 | 2025-03-01T00:12:02.796Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = IpPoolList
result = Ok(())
uri = /v1/system/ip-pools
|
3033 | 2025-03-01T00:12:02.796Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = Database
uri = /v1/system/ip-pools
|
3034 | 2025-03-01T00:12:02.797Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools
|
3035 | 2025-03-01T00:12:02.798Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
resource = Database
result = Ok(())
uri = /v1/system/ip-pools
|
3036 | 2025-03-01T00:12:02.808Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 119439
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 1f6179b1-6dba-452f-876a-9117b9361f91
response_code = 201
uri = /v1/system/ip-pools
|
3037 | 2025-03-01T00:12:02.809Z | INFO | test_instance_serial (external client test context): client received response
status = 201
|
3038 | 2025-03-01T00:12:02.810Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/system/ip-pools/default/ranges/add
|
3039 | 2025-03-01T00:12:02.810Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
uri = /v1/system/ip-pools/default/ranges/add
|
3040 | 2025-03-01T00:12:02.811Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
uri = /v1/system/ip-pools/default/ranges/add
|
3041 | 2025-03-01T00:12:02.811Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools/default/ranges/add
|
3042 | 2025-03-01T00:12:02.811Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3043 | 2025-03-01T00:12:02.811Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3044 | 2025-03-01T00:12:02.812Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3045 | 2025-03-01T00:12:02.814Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3046 | 2025-03-01T00:12:02.814Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3047 | 2025-03-01T00:12:02.815Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3048 | 2025-03-01T00:12:02.816Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3049 | 2025-03-01T00:12:02.817Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3050 | 2025-03-01T00:12:02.817Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3051 | 2025-03-01T00:12:02.817Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3052 | 2025-03-01T00:12:02.817Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3053 | 2025-03-01T00:12:02.820Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3054 | 2025-03-01T00:12:02.820Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3055 | 2025-03-01T00:12:02.820Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3056 | 2025-03-01T00:12:02.820Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3057 | 2025-03-01T00:12:02.821Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3058 | 2025-03-01T00:12:02.825Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3059 | 2025-03-01T00:12:02.826Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3060 | 2025-03-01T00:12:02.826Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3061 | 2025-03-01T00:12:02.826Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3062 | 2025-03-01T00:12:02.828Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3063 | 2025-03-01T00:12:02.828Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3064 | 2025-03-01T00:12:02.828Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3065 | 2025-03-01T00:12:02.829Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3066 | 2025-03-01T00:12:02.829Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3067 | 2025-03-01T00:12:02.832Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3068 | 2025-03-01T00:12:02.834Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3069 | 2025-03-01T00:12:02.834Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3070 | 2025-03-01T00:12:02.834Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3071 | 2025-03-01T00:12:02.834Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3072 | 2025-03-01T00:12:02.837Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3073 | 2025-03-01T00:12:02.837Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
uri = /v1/system/ip-pools/default/ranges/add
|
3074 | 2025-03-01T00:12:02.837Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3075 | 2025-03-01T00:12:02.839Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3076 | 2025-03-01T00:12:02.839Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3077 | 2025-03-01T00:12:02.840Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/ranges/add
|
3078 | 2025-03-01T00:12:02.840Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/ranges/add
|
3079 | 2025-03-01T00:12:02.840Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3080 | 2025-03-01T00:12:02.841Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3081 | 2025-03-01T00:12:02.841Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3082 | 2025-03-01T00:12:02.843Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/ranges/add
|
3083 | 2025-03-01T00:12:02.848Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3084 | 2025-03-01T00:12:02.848Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3085 | 2025-03-01T00:12:02.848Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3086 | 2025-03-01T00:12:02.849Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3087 | 2025-03-01T00:12:02.851Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3088 | 2025-03-01T00:12:02.851Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3089 | 2025-03-01T00:12:02.852Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3090 | 2025-03-01T00:12:02.853Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/ranges/add
|
3091 | 2025-03-01T00:12:02.854Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/ranges/add
|
3092 | 2025-03-01T00:12:02.854Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
uri = /v1/system/ip-pools/default/ranges/add
|
3093 | 2025-03-01T00:12:02.855Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/ranges/add
|
3094 | 2025-03-01T00:12:02.856Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3095 | 2025-03-01T00:12:02.857Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/ranges/add
|
3096 | 2025-03-01T00:12:02.859Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/ranges/add
|
3097 | 2025-03-01T00:12:02.875Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 65241
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd
response_code = 201
uri = /v1/system/ip-pools/default/ranges/add
|
3098 | 2025-03-01T00:12:02.875Z | INFO | test_instance_serial (external client test context): client received response
status = 201
|
3099 | 2025-03-01T00:12:02.876Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/system/ip-pools/default/silos
|
3100 | 2025-03-01T00:12:02.876Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
uri = /v1/system/ip-pools/default/silos
|
3101 | 2025-03-01T00:12:02.877Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
uri = /v1/system/ip-pools/default/silos
|
3102 | 2025-03-01T00:12:02.877Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/system/ip-pools/default/silos
|
3103 | 2025-03-01T00:12:02.877Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3104 | 2025-03-01T00:12:02.877Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3105 | 2025-03-01T00:12:02.877Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3106 | 2025-03-01T00:12:02.879Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3107 | 2025-03-01T00:12:02.879Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3108 | 2025-03-01T00:12:02.880Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3109 | 2025-03-01T00:12:02.881Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3110 | 2025-03-01T00:12:02.881Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3111 | 2025-03-01T00:12:02.883Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3112 | 2025-03-01T00:12:02.884Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3113 | 2025-03-01T00:12:02.884Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3114 | 2025-03-01T00:12:02.884Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3115 | 2025-03-01T00:12:02.885Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3116 | 2025-03-01T00:12:02.885Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3117 | 2025-03-01T00:12:02.885Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3118 | 2025-03-01T00:12:02.888Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3119 | 2025-03-01T00:12:02.891Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3120 | 2025-03-01T00:12:02.896Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3121 | 2025-03-01T00:12:02.896Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3122 | 2025-03-01T00:12:02.896Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3123 | 2025-03-01T00:12:02.897Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3124 | 2025-03-01T00:12:02.897Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3125 | 2025-03-01T00:12:02.897Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3126 | 2025-03-01T00:12:02.897Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3127 | 2025-03-01T00:12:02.897Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3128 | 2025-03-01T00:12:02.898Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3129 | 2025-03-01T00:12:02.898Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3130 | 2025-03-01T00:12:02.898Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3131 | 2025-03-01T00:12:02.898Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3132 | 2025-03-01T00:12:02.900Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3133 | 2025-03-01T00:12:02.902Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3134 | 2025-03-01T00:12:02.903Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
uri = /v1/system/ip-pools/default/silos
|
3135 | 2025-03-01T00:12:02.903Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3136 | 2025-03-01T00:12:02.903Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3137 | 2025-03-01T00:12:02.903Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3138 | 2025-03-01T00:12:02.905Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
uri = /v1/system/ip-pools/default/silos
|
3139 | 2025-03-01T00:12:02.905Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3140 | 2025-03-01T00:12:02.906Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3141 | 2025-03-01T00:12:02.906Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3142 | 2025-03-01T00:12:02.906Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3143 | 2025-03-01T00:12:02.911Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3144 | 2025-03-01T00:12:02.915Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") }
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3145 | 2025-03-01T00:12:02.917Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3146 | 2025-03-01T00:12:02.917Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3147 | 2025-03-01T00:12:02.917Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3148 | 2025-03-01T00:12:02.919Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3149 | 2025-03-01T00:12:02.919Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3150 | 2025-03-01T00:12:02.920Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3151 | 2025-03-01T00:12:02.923Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
uri = /v1/system/ip-pools/default/silos
|
3152 | 2025-03-01T00:12:02.924Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/system/ip-pools/default/silos
|
3153 | 2025-03-01T00:12:02.924Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3154 | 2025-03-01T00:12:02.924Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3155 | 2025-03-01T00:12:02.924Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3156 | 2025-03-01T00:12:02.962Z | DEBG | test_instance_serial (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:41715/metrics/producers
|
3157 | 2025-03-01T00:12:02.963Z | INFO | test_instance_serial (dropshot_internal): accepted connection
local_addr = 127.0.0.1:41715
remote_addr = 127.0.0.1:42658
|
3158 | 2025-03-01T00:12:02.965Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42658
req_id = b6271358-317b-45c0-bff1-b5575ddaff25
uri = /metrics/producers
|
3159 | 2025-03-01T00:12:02.965Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42658
req_id = b6271358-317b-45c0-bff1-b5575ddaff25
resource = Database
uri = /metrics/producers
|
3160 | 2025-03-01T00:12:02.965Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42658
req_id = b6271358-317b-45c0-bff1-b5575ddaff25
roles = RoleSet { roles: {} }
uri = /metrics/producers
|
3161 | 2025-03-01T00:12:02.966Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42658
req_id = b6271358-317b-45c0-bff1-b5575ddaff25
resource = Database
result = Ok(())
uri = /metrics/producers
|
3162 | 2025-03-01T00:12:02.966Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3163 | 2025-03-01T00:12:02.966Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3164 | 2025-03-01T00:12:02.967Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3165 | 2025-03-01T00:12:02.967Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3166 | 2025-03-01T00:12:02.972Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3167 | 2025-03-01T00:12:02.975Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3168 | 2025-03-01T00:12:02.975Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = IpPoolList
uri = /v1/system/ip-pools/default/silos
|
3169 | 2025-03-01T00:12:02.975Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/system/ip-pools/default/silos
|
3170 | 2025-03-01T00:12:02.975Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3171 | 2025-03-01T00:12:02.975Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3172 | 2025-03-01T00:12:02.975Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3173 | 2025-03-01T00:12:02.978Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
uri = /v1/system/ip-pools/default/silos
|
3174 | 2025-03-01T00:12:02.982Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = IpPoolList
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3175 | 2025-03-01T00:12:02.982Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
uri = /v1/system/ip-pools/default/silos
|
3176 | 2025-03-01T00:12:02.983Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
roles = RoleSet { roles: {} }
uri = /v1/system/ip-pools/default/silos
|
3177 | 2025-03-01T00:12:02.983Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
resource = Database
result = Ok(())
uri = /v1/system/ip-pools/default/silos
|
3178 | 2025-03-01T00:12:02.983Z | INFO | test_instance_serial (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3179 | 2025-03-01T00:12:02.985Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 19933
local_addr = 127.0.0.1:41715
method = POST
remote_addr = 127.0.0.1:42658
req_id = b6271358-317b-45c0-bff1-b5575ddaff25
response_code = 201
uri = /metrics/producers
|
3180 | 2025-03-01T00:12:02.985Z | DEBG | test_instance_serial (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "b6271358-317b-45c0-bff1-b5575ddaff25", "content-length": "41", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
|
3181 | 2025-03-01T00:12:02.985Z | DEBG | test_instance_serial (producer-registration-task): registered with nexus successfully
|
3182 | 2025-03-01T00:12:02.985Z | DEBG | test_instance_serial (producer-registration-task): pausing until time to renew lease
lease_duration = 600s
wait_period = 150s
|
3183 | 2025-03-01T00:12:03.061Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 185563
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9
response_code = 201
uri = /v1/system/ip-pools/default/silos
|
3184 | 2025-03-01T00:12:03.062Z | INFO | test_instance_serial (external client test context): client received response
status = 201
|
3185 | 2025-03-01T00:12:03.063Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/projects
|
3186 | 2025-03-01T00:12:03.063Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
uri = /v1/projects
|
3187 | 2025-03-01T00:12:03.063Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
uri = /v1/projects
|
3188 | 2025-03-01T00:12:03.063Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/projects
|
3189 | 2025-03-01T00:12:03.063Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3190 | 2025-03-01T00:12:03.063Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3191 | 2025-03-01T00:12:03.064Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3192 | 2025-03-01T00:12:03.065Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3193 | 2025-03-01T00:12:03.065Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3194 | 2025-03-01T00:12:03.067Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3195 | 2025-03-01T00:12:03.067Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3196 | 2025-03-01T00:12:03.068Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3197 | 2025-03-01T00:12:03.068Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3198 | 2025-03-01T00:12:03.068Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3199 | 2025-03-01T00:12:03.069Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3200 | 2025-03-01T00:12:03.070Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3201 | 2025-03-01T00:12:03.070Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3202 | 2025-03-01T00:12:03.070Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3203 | 2025-03-01T00:12:03.071Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3204 | 2025-03-01T00:12:03.072Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3205 | 2025-03-01T00:12:03.075Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3206 | 2025-03-01T00:12:03.075Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3207 | 2025-03-01T00:12:03.075Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3208 | 2025-03-01T00:12:03.076Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3209 | 2025-03-01T00:12:03.078Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3210 | 2025-03-01T00:12:03.078Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3211 | 2025-03-01T00:12:03.078Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3212 | 2025-03-01T00:12:03.078Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3213 | 2025-03-01T00:12:03.078Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3214 | 2025-03-01T00:12:03.083Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3215 | 2025-03-01T00:12:03.084Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3216 | 2025-03-01T00:12:03.084Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3217 | 2025-03-01T00:12:03.084Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3218 | 2025-03-01T00:12:03.086Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3219 | 2025-03-01T00:12:03.089Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3220 | 2025-03-01T00:12:03.090Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
uri = /v1/projects
|
3221 | 2025-03-01T00:12:03.091Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
uri = /v1/projects
|
3222 | 2025-03-01T00:12:03.091Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/projects
|
3223 | 2025-03-01T00:12:03.091Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Database
uri = /v1/projects
|
3224 | 2025-03-01T00:12:03.091Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
roles = RoleSet { roles: {} }
uri = /v1/projects
|
3225 | 2025-03-01T00:12:03.091Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Database
result = Ok(())
uri = /v1/projects
|
3226 | 2025-03-01T00:12:03.091Z | TRAC | test_instance_serial (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3227 | 2025-03-01T00:12:03.093Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/projects
|
3228 | 2025-03-01T00:12:03.093Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Database
uri = /v1/projects
|
3229 | 2025-03-01T00:12:03.093Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
roles = RoleSet { roles: {} }
uri = /v1/projects
|
3230 | 2025-03-01T00:12:03.094Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Database
result = Ok(())
uri = /v1/projects
|
3231 | 2025-03-01T00:12:03.097Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/projects
|
3232 | 2025-03-01T00:12:03.102Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
uri = /v1/projects
|
3233 | 2025-03-01T00:12:03.103Z | INFO | test_instance_serial (SagaExecutor): preparing saga
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
|
3234 | 2025-03-01T00:12:03.103Z | INFO | test_instance_serial (SEC): saga create
dag = {"end_node":19,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[2,3,null],[16,17,null],[18,0,null],[17,19,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":18}
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3235 | 2025-03-01T00:12:03.103Z | INFO | test_instance_serial (SecStore): creating saga
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
|
3236 | 2025-03-01T00:12:03.165Z | INFO | test_instance_serial (SagaExecutor): starting saga
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
|
3237 | 2025-03-01T00:12:03.165Z | INFO | test_instance_serial (SEC): saga start
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3238 | 2025-03-01T00:12:03.166Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N018 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3239 | 2025-03-01T00:12:03.166Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3240 | 2025-03-01T00:12:03.205Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N018 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3241 | 2025-03-01T00:12:03.205Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3242 | 2025-03-01T00:12:03.212Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3243 | 2025-03-01T00:12:03.212Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3244 | 2025-03-01T00:12:03.220Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3245 | 2025-03-01T00:12:03.221Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3246 | 2025-03-01T00:12:03.221Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3247 | 2025-03-01T00:12:03.221Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3248 | 2025-03-01T00:12:03.221Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3249 | 2025-03-01T00:12:03.225Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3250 | 2025-03-01T00:12:03.225Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3251 | 2025-03-01T00:12:03.225Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3252 | 2025-03-01T00:12:03.225Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3253 | 2025-03-01T00:12:03.229Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3254 | 2025-03-01T00:12:03.232Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3255 | 2025-03-01T00:12:03.232Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3256 | 2025-03-01T00:12:03.232Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3257 | 2025-03-01T00:12:03.233Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = ProjectCreateRecord
|
3258 | 2025-03-01T00:12:03.265Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3259 | 2025-03-01T00:12:03.265Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}])
node_id = 0
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3260 | 2025-03-01T00:12:03.282Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3261 | 2025-03-01T00:12:03.282Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3262 | 2025-03-01T00:12:03.292Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3263 | 2025-03-01T00:12:03.292Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}})
node_id = 1
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3264 | 2025-03-01T00:12:03.298Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3265 | 2025-03-01T00:12:03.298Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3266 | 2025-03-01T00:12:03.304Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3267 | 2025-03-01T00:12:03.304Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3268 | 2025-03-01T00:12:03.310Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3269 | 2025-03-01T00:12:03.312Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3270 | 2025-03-01T00:12:03.317Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3271 | 2025-03-01T00:12:03.319Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("7b27527e-c873-4059-a48d-0d5039286f85"))
node_id = 3
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3272 | 2025-03-01T00:12:03.323Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3273 | 2025-03-01T00:12:03.323Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3274 | 2025-03-01T00:12:03.325Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: ab 00 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:51836
req_id = 53bce115-e675-4737-94b4-10ef73441e60
|
3275 | 2025-03-01T00:12:03.326Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 43776,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:51836
req_id = 53bce115-e675-4737-94b4-10ef73441e60
|
3276 | 2025-03-01T00:12:03.327Z | DEBG | test_instance_serial (store): query key
key = _crucible-pantry._tcp
|
3277 | 2025-03-01T00:12:03.327Z | DEBG | test_instance_serial (store): query key
key = 758d4c62-f125-45a8-83d6-22953d8c0fe0.host
|
3278 | 2025-03-01T00:12:03.327Z | DEBG | test_instance_serial (dns): dns response
additional_records = [Record { name_labels: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
kind = dns
peer_addr = [::1]:51836
query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 34655, target: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal") })) }]
req_id = 53bce115-e675-4737-94b4-10ef73441e60
|
3279 | 2025-03-01T00:12:03.327Z | TRAC | test_instance_serial (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: ec 5c 01 00 00 01 00 00 00 00 00 01 24 37 35 38 .\\..........$758\n0010: 64 34 63 36 32 2d 66 31 32 35 2d 34 35 61 38 2d d4c62-f125-45a8-\n0020: 38 33 64 36 2d 32 32 39 35 33 64 38 63 30 66 65 83d6-22953d8c0fe\n0030: 30 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 0.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:52087
req_id = 750cfb9d-7032-446e-90ee-012d644b707e
|
3280 | 2025-03-01T00:12:03.327Z | DEBG | test_instance_serial (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 60508,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 55,\n 53,\n 56,\n 100,\n 52,\n 99,\n 54,\n 50,\n 45,\n 102,\n 49,\n 50,\n 53,\n 45,\n 52,\n 53,\n 97,\n 56,\n 45,\n 56,\n 51,\n 100,\n 54,\n 45,\n 50,\n 50,\n 57,\n 53,\n 51,\n 100,\n 56,\n 99,\n 48,\n 102,\n 101,\n 48,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n}
peer_addr = [::1]:52087
req_id = 750cfb9d-7032-446e-90ee-012d644b707e
|
3281 | 2025-03-01T00:12:03.328Z | DEBG | test_instance_serial (store): query key
key = 758d4c62-f125-45a8-83d6-22953d8c0fe0.host
|
3282 | 2025-03-01T00:12:03.328Z | DEBG | test_instance_serial (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:52087
query = LowerQuery { name: LowerName(Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal.")), original: Query { name: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }]
req_id = 750cfb9d-7032-446e-90ee-012d644b707e
|
3283 | 2025-03-01T00:12:03.368Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3284 | 2025-03-01T00:12:03.368Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("62f2baeb-6247-44a9-9a7e-7024222a2eee"))
node_id = 4
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3285 | 2025-03-01T00:12:03.368Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37830
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3286 | 2025-03-01T00:12:03.369Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37830
req_id = be8af59c-9a88-4d72-b806-6cc68206da18
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3287 | 2025-03-01T00:12:03.369Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 338
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37830
req_id = be8af59c-9a88-4d72-b806-6cc68206da18
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3288 | 2025-03-01T00:12:03.644Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3289 | 2025-03-01T00:12:03.645Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3290 | 2025-03-01T00:12:03.645Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37832
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3291 | 2025-03-01T00:12:03.645Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37834
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3292 | 2025-03-01T00:12:03.645Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37836
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3293 | 2025-03-01T00:12:03.645Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37838
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3294 | 2025-03-01T00:12:03.646Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37840
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3295 | 2025-03-01T00:12:03.646Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37844
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3296 | 2025-03-01T00:12:03.646Z | INFO | test_instance_serial (dropshot): accepted connection
kind = pantry
local_addr = [::1]:34655
remote_addr = [::1]:37848
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
3297 | 2025-03-01T00:12:03.647Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37832
req_id = fa250be3-6a0e-4bbb-8bfc-abffc244e2a5
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3298 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37834
req_id = f7259905-f9ea-4f46-b28c-ce1ea8ada6ea
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3299 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37836
req_id = 2778c549-27c0-4d03-a2ac-0acf8d80b518
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3300 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37838
req_id = fc536370-d21f-41c4-9825-24b052268717
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3301 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37840
req_id = e229cbec-b513-4d49-8f87-0211e6f9dc7e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3302 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37844
req_id = 7df3c714-0fcc-4a32-b407-4ed2ba509500
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3303 | 2025-03-01T00:12:03.648Z | TRAC | test_instance_serial (dropshot): incoming request
kind = pantry
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37848
req_id = c331027a-5930-49e6-8878-a15424beac2f
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3304 | 2025-03-01T00:12:03.649Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 936
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37832
req_id = fa250be3-6a0e-4bbb-8bfc-abffc244e2a5
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3305 | 2025-03-01T00:12:03.649Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 767
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37834
req_id = f7259905-f9ea-4f46-b28c-ce1ea8ada6ea
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3306 | 2025-03-01T00:12:03.649Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 719
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37836
req_id = 2778c549-27c0-4d03-a2ac-0acf8d80b518
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3307 | 2025-03-01T00:12:03.649Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 662
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37838
req_id = fc536370-d21f-41c4-9825-24b052268717
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3308 | 2025-03-01T00:12:03.649Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 1501
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37840
req_id = e229cbec-b513-4d49-8f87-0211e6f9dc7e
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3309 | 2025-03-01T00:12:03.651Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 1600
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37844
req_id = 7df3c714-0fcc-4a32-b407-4ed2ba509500
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3310 | 2025-03-01T00:12:03.651Z | INFO | test_instance_serial (dropshot): request completed
kind = pantry
latency_us = 1552
local_addr = [::1]:34655
method = GET
remote_addr = [::1]:37848
req_id = c331027a-5930-49e6-8878-a15424beac2f
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
3311 | 2025-03-01T00:12:03.653Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3312 | 2025-03-01T00:12:03.653Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("34c74f71-dd92-4bcd-a346-3ee23370ae3c"))
node_id = 5
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3313 | 2025-03-01T00:12:03.659Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3314 | 2025-03-01T00:12:03.660Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3315 | 2025-03-01T00:12:03.666Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3316 | 2025-03-01T00:12:03.667Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("75e86919-d5cf-408c-9d8e-1ac2759615b1"))
node_id = 6
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3317 | 2025-03-01T00:12:03.672Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3318 | 2025-03-01T00:12:03.673Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3319 | 2025-03-01T00:12:03.678Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3320 | 2025-03-01T00:12:03.679Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("26dd1eee-2faf-4c35-b70b-9324674f17ef"))
node_id = 7
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3321 | 2025-03-01T00:12:03.696Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3322 | 2025-03-01T00:12:03.696Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3323 | 2025-03-01T00:12:03.702Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3324 | 2025-03-01T00:12:03.704Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("0a0c9f59-6a31-43b0-969f-131b36ea3043"))
node_id = 8
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3325 | 2025-03-01T00:12:03.709Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3326 | 2025-03-01T00:12:03.709Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3327 | 2025-03-01T00:12:03.715Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3328 | 2025-03-01T00:12:03.715Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3329 | 2025-03-01T00:12:03.716Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3330 | 2025-03-01T00:12:03.717Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3331 | 2025-03-01T00:12:03.722Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3332 | 2025-03-01T00:12:03.724Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3333 | 2025-03-01T00:12:03.724Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3334 | 2025-03-01T00:12:03.731Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3335 | 2025-03-01T00:12:03.732Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3336 | 2025-03-01T00:12:03.734Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3337 | 2025-03-01T00:12:03.734Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3338 | 2025-03-01T00:12:03.735Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3339 | 2025-03-01T00:12:03.737Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3340 | 2025-03-01T00:12:03.737Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3341 | 2025-03-01T00:12:03.737Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3342 | 2025-03-01T00:12:03.747Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3343 | 2025-03-01T00:12:03.750Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3344 | 2025-03-01T00:12:03.750Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3345 | 2025-03-01T00:12:03.750Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3346 | 2025-03-01T00:12:03.755Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3347 | 2025-03-01T00:12:03.761Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3348 | 2025-03-01T00:12:03.763Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3349 | 2025-03-01T00:12:03.763Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3350 | 2025-03-01T00:12:03.763Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateVpc
|
3351 | 2025-03-01T00:12:03.781Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3352 | 2025-03-01T00:12:03.781Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("7b27527e-c873-4059-a48d-0d5039286f85"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.715196Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.715196Z")}, "ipv6_prefix": String("fdaf:bb89:e881::/48"), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "subnet_gen": Number(1), "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vni": Number(10277605)}])
node_id = 9
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3353 | 2025-03-01T00:12:03.801Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3354 | 2025-03-01T00:12:03.802Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3355 | 2025-03-01T00:12:03.807Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3356 | 2025-03-01T00:12:03.808Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3357 | 2025-03-01T00:12:03.808Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3358 | 2025-03-01T00:12:03.808Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3359 | 2025-03-01T00:12:03.808Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3360 | 2025-03-01T00:12:03.812Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3361 | 2025-03-01T00:12:03.812Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3362 | 2025-03-01T00:12:03.812Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3363 | 2025-03-01T00:12:03.813Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3364 | 2025-03-01T00:12:03.816Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3365 | 2025-03-01T00:12:03.816Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3366 | 2025-03-01T00:12:03.817Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3367 | 2025-03-01T00:12:03.817Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3368 | 2025-03-01T00:12:03.822Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3369 | 2025-03-01T00:12:03.836Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3370 | 2025-03-01T00:12:03.837Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3371 | 2025-03-01T00:12:03.837Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3372 | 2025-03-01T00:12:03.837Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateRouter
|
3373 | 2025-03-01T00:12:03.851Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3374 | 2025-03-01T00:12:03.851Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 10
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3375 | 2025-03-01T00:12:03.857Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3376 | 2025-03-01T00:12:03.858Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3377 | 2025-03-01T00:12:03.863Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3378 | 2025-03-01T00:12:03.863Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3379 | 2025-03-01T00:12:03.864Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3380 | 2025-03-01T00:12:03.864Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3381 | 2025-03-01T00:12:03.864Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3382 | 2025-03-01T00:12:03.871Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3383 | 2025-03-01T00:12:03.871Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3384 | 2025-03-01T00:12:03.871Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3385 | 2025-03-01T00:12:03.872Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3386 | 2025-03-01T00:12:03.876Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3387 | 2025-03-01T00:12:03.876Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3388 | 2025-03-01T00:12:03.876Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3389 | 2025-03-01T00:12:03.876Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3390 | 2025-03-01T00:12:03.878Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3391 | 2025-03-01T00:12:03.889Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3392 | 2025-03-01T00:12:03.889Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3393 | 2025-03-01T00:12:03.889Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3394 | 2025-03-01T00:12:03.889Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV4Route
|
3395 | 2025-03-01T00:12:03.905Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3396 | 2025-03-01T00:12:03.905Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 11
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3397 | 2025-03-01T00:12:03.912Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N012 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3398 | 2025-03-01T00:12:03.912Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3399 | 2025-03-01T00:12:03.919Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3400 | 2025-03-01T00:12:03.920Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3401 | 2025-03-01T00:12:03.921Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3402 | 2025-03-01T00:12:03.921Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3403 | 2025-03-01T00:12:03.921Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3404 | 2025-03-01T00:12:03.925Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3405 | 2025-03-01T00:12:03.925Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3406 | 2025-03-01T00:12:03.925Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3407 | 2025-03-01T00:12:03.932Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3408 | 2025-03-01T00:12:03.941Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3409 | 2025-03-01T00:12:03.941Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3410 | 2025-03-01T00:12:03.941Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3411 | 2025-03-01T00:12:03.942Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3412 | 2025-03-01T00:12:03.948Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3413 | 2025-03-01T00:12:03.959Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3414 | 2025-03-01T00:12:03.959Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3415 | 2025-03-01T00:12:03.959Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3416 | 2025-03-01T00:12:03.960Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateV6Route
|
3417 | 2025-03-01T00:12:03.975Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N012 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3418 | 2025-03-01T00:12:03.975Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3419 | 2025-03-01T00:12:03.984Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N013 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3420 | 2025-03-01T00:12:03.985Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3421 | 2025-03-01T00:12:03.991Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3422 | 2025-03-01T00:12:03.992Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3423 | 2025-03-01T00:12:03.992Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3424 | 2025-03-01T00:12:03.992Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3425 | 2025-03-01T00:12:03.992Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3426 | 2025-03-01T00:12:03.995Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3427 | 2025-03-01T00:12:03.995Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3428 | 2025-03-01T00:12:03.995Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3429 | 2025-03-01T00:12:03.996Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3430 | 2025-03-01T00:12:03.999Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3431 | 2025-03-01T00:12:03.999Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3432 | 2025-03-01T00:12:03.999Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3433 | 2025-03-01T00:12:04.001Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3434 | 2025-03-01T00:12:04.005Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3435 | 2025-03-01T00:12:04.014Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3436 | 2025-03-01T00:12:04.021Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3437 | 2025-03-01T00:12:04.021Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3438 | 2025-03-01T00:12:04.022Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3439 | 2025-03-01T00:12:04.062Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3440 | 2025-03-01T00:12:04.063Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3441 | 2025-03-01T00:12:04.063Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateSubnet
|
3442 | 2025-03-01T00:12:04.074Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N013 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3443 | 2025-03-01T00:12:04.074Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}])
node_id = 13
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3444 | 2025-03-01T00:12:04.082Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N014 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3445 | 2025-03-01T00:12:04.082Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3446 | 2025-03-01T00:12:04.088Z | DEBG | test_instance_serial (nexus): default firewall rules for vpc default
rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 84bd3491-3272-4ea1-a5c0-328d8069357c, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-01T00:12:04.088654197Z, time_modified: 2025-03-01T00:12:04.088654197Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: a0e49892-101c-48f9-8485-61213a77dcfd, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-01T00:12:04.088674058Z, time_modified: 2025-03-01T00:12:04.088674058Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: fbd5ee63-984e-4a44-9c54-a654943e0fb4, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-01T00:12:04.088686378Z, time_modified: 2025-03-01T00:12:04.088686378Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
|
3447 | 2025-03-01T00:12:04.088Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3448 | 2025-03-01T00:12:04.090Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3449 | 2025-03-01T00:12:04.090Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3450 | 2025-03-01T00:12:04.090Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3451 | 2025-03-01T00:12:04.090Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3452 | 2025-03-01T00:12:04.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3453 | 2025-03-01T00:12:04.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
3454 | 2025-03-01T00:12:04.090Z | DEBG | test_instance_serial (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
3455 | 2025-03-01T00:12:04.090Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
|
3456 | 2025-03-01T00:12:04.093Z | TRAC | test_instance_serial (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
3457 | 2025-03-01T00:12:04.093Z | DEBG | test_instance_serial (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:04.090704411Z }
timeseries_name = integration_target:integration_metric
|
3458 | 2025-03-01T00:12:04.093Z | DEBG | test_instance_serial (clickhouse-client): inserting 1 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
3459 | 2025-03-01T00:12:04.093Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 6
n_rows = 1
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
3460 | 2025-03-01T00:12:04.094Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3461 | 2025-03-01T00:12:04.094Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3462 | 2025-03-01T00:12:04.094Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3463 | 2025-03-01T00:12:04.095Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3464 | 2025-03-01T00:12:04.099Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3465 | 2025-03-01T00:12:04.099Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3466 | 2025-03-01T00:12:04.099Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3467 | 2025-03-01T00:12:04.099Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3468 | 2025-03-01T00:12:04.103Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
3469 | 2025-03-01T00:12:04.105Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3470 | 2025-03-01T00:12:04.114Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3471 | 2025-03-01T00:12:04.115Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3472 | 2025-03-01T00:12:04.115Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3473 | 2025-03-01T00:12:04.116Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcUpdateFirewall
|
3474 | 2025-03-01T00:12:04.118Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
3475 | 2025-03-01T00:12:04.120Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
3476 | 2025-03-01T00:12:04.124Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
3477 | 2025-03-01T00:12:04.124Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3478 | 2025-03-01T00:12:04.254Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N014 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3479 | 2025-03-01T00:12:04.254Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}])
node_id = 14
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3480 | 2025-03-01T00:12:04.262Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N015 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3481 | 2025-03-01T00:12:04.263Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3482 | 2025-03-01T00:12:04.275Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3483 | 2025-03-01T00:12:04.275Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3484 | 2025-03-01T00:12:04.275Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3485 | 2025-03-01T00:12:04.276Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3486 | 2025-03-01T00:12:04.277Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3487 | 2025-03-01T00:12:04.280Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3488 | 2025-03-01T00:12:04.282Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3489 | 2025-03-01T00:12:04.282Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3490 | 2025-03-01T00:12:04.282Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3491 | 2025-03-01T00:12:04.284Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3492 | 2025-03-01T00:12:04.284Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3493 | 2025-03-01T00:12:04.285Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3494 | 2025-03-01T00:12:04.285Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3495 | 2025-03-01T00:12:04.292Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3496 | 2025-03-01T00:12:04.295Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3497 | 2025-03-01T00:12:04.295Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3498 | 2025-03-01T00:12:04.296Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3499 | 2025-03-01T00:12:04.296Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3500 | 2025-03-01T00:12:04.307Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3501 | 2025-03-01T00:12:04.313Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3502 | 2025-03-01T00:12:04.313Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3503 | 2025-03-01T00:12:04.322Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3504 | 2025-03-01T00:12:04.322Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3505 | 2025-03-01T00:12:04.322Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3506 | 2025-03-01T00:12:04.328Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ById(0a0c9f59-6a31-43b0-969f-131b36ea3043) }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3507 | 2025-03-01T00:12:04.329Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3508 | 2025-03-01T00:12:04.329Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3509 | 2025-03-01T00:12:04.330Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3510 | 2025-03-01T00:12:04.330Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3511 | 2025-03-01T00:12:04.332Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3512 | 2025-03-01T00:12:04.332Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3513 | 2025-03-01T00:12:04.332Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3514 | 2025-03-01T00:12:04.333Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3515 | 2025-03-01T00:12:04.335Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3516 | 2025-03-01T00:12:04.336Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3517 | 2025-03-01T00:12:04.336Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3518 | 2025-03-01T00:12:04.337Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3519 | 2025-03-01T00:12:04.339Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3520 | 2025-03-01T00:12:04.359Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ById(0a0c9f59-6a31-43b0-969f-131b36ea3043) }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3521 | 2025-03-01T00:12:04.360Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3522 | 2025-03-01T00:12:04.360Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3523 | 2025-03-01T00:12:04.360Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcCreateGateway
|
3524 | 2025-03-01T00:12:04.379Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N015 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3525 | 2025-03-01T00:12:04.379Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 15
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3526 | 2025-03-01T00:12:04.386Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N016 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3527 | 2025-03-01T00:12:04.386Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3528 | 2025-03-01T00:12:04.402Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3529 | 2025-03-01T00:12:04.402Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3530 | 2025-03-01T00:12:04.402Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3531 | 2025-03-01T00:12:04.404Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3532 | 2025-03-01T00:12:04.405Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3533 | 2025-03-01T00:12:04.406Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3534 | 2025-03-01T00:12:04.407Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3535 | 2025-03-01T00:12:04.408Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3536 | 2025-03-01T00:12:04.408Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3537 | 2025-03-01T00:12:04.409Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3538 | 2025-03-01T00:12:04.410Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3539 | 2025-03-01T00:12:04.410Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3540 | 2025-03-01T00:12:04.410Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3541 | 2025-03-01T00:12:04.410Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3542 | 2025-03-01T00:12:04.412Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3543 | 2025-03-01T00:12:04.413Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3544 | 2025-03-01T00:12:04.413Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3545 | 2025-03-01T00:12:04.413Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3546 | 2025-03-01T00:12:04.417Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3547 | 2025-03-01T00:12:04.419Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3548 | 2025-03-01T00:12:04.419Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3549 | 2025-03-01T00:12:04.419Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3550 | 2025-03-01T00:12:04.420Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3551 | 2025-03-01T00:12:04.428Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3552 | 2025-03-01T00:12:04.430Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3553 | 2025-03-01T00:12:04.430Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3554 | 2025-03-01T00:12:04.430Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3555 | 2025-03-01T00:12:04.430Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3556 | 2025-03-01T00:12:04.430Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3557 | 2025-03-01T00:12:04.436Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3558 | 2025-03-01T00:12:04.437Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3559 | 2025-03-01T00:12:04.437Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3560 | 2025-03-01T00:12:04.437Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3561 | 2025-03-01T00:12:04.440Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3562 | 2025-03-01T00:12:04.440Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3563 | 2025-03-01T00:12:04.440Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3564 | 2025-03-01T00:12:04.441Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3565 | 2025-03-01T00:12:04.444Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3566 | 2025-03-01T00:12:04.455Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3567 | 2025-03-01T00:12:04.455Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3568 | 2025-03-01T00:12:04.455Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3569 | 2025-03-01T00:12:04.456Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_node = VpcNotifySleds
|
3570 | 2025-03-01T00:12:04.464Z | DEBG | test_instance_serial (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {}
|
3571 | 2025-03-01T00:12:04.464Z | DEBG | test_instance_serial (nexus): resolved firewall rules for sled agents
sled_agent_rules = []
|
3572 | 2025-03-01T00:12:04.464Z | DEBG | test_instance_serial (nexus): resolved 0 rules for sleds
|
3573 | 2025-03-01T00:12:04.499Z | DEBG | test_instance_serial (nexus): resolved sleds for vpc default
vpc_to_sled = []
|
3574 | 2025-03-01T00:12:04.499Z | DEBG | test_instance_serial (nexus): sending firewall rules to sled agents
|
3575 | 2025-03-01T00:12:04.499Z | INFO | test_instance_serial (nexus): updated firewall rules on 0 sleds
|
3576 | 2025-03-01T00:12:04.504Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N016 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3577 | 2025-03-01T00:12:04.505Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 16
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3578 | 2025-03-01T00:12:04.511Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N017 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3579 | 2025-03-01T00:12:04.512Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3580 | 2025-03-01T00:12:04.517Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N017 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3581 | 2025-03-01T00:12:04.518Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 17
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3582 | 2025-03-01T00:12:04.523Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N019 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3583 | 2025-03-01T00:12:04.523Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3584 | 2025-03-01T00:12:04.530Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N019 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3585 | 2025-03-01T00:12:04.530Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 19
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3586 | 2025-03-01T00:12:04.536Z | INFO | test_instance_serial (SEC): update for saga cached state
new_state = Done
saga_id = f8838032-0362-4833-90a9-a6213af87ece
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3587 | 2025-03-01T00:12:04.536Z | INFO | test_instance_serial (SecStore): updating state
new_state = done
saga_id = f8838032-0362-4833-90a9-a6213af87ece
|
3588 | 2025-03-01T00:12:04.556Z | INFO | test_instance_serial (SEC): saga finished
result = success
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3589 | 2025-03-01T00:12:04.557Z | INFO | test_instance_serial (SagaExecutor): saga finished
saga_id = f8838032-0362-4833-90a9-a6213af87ece
saga_name = project-create
saga_result = SagaResult { saga_id: f8838032-0362-4833-90a9-a6213af87ece, saga_log: SagaLog { saga_id: f8838032-0362-4833-90a9-a6213af87ece, unwinding: false, events: [N018 started, N018 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N019 started, N019 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("7b27527e-c873-4059-a48d-0d5039286f85")), 4: Succeeded(String("62f2baeb-6247-44a9-9a7e-7024222a2eee")), 5: Succeeded(String("34c74f71-dd92-4bcd-a346-3ee23370ae3c")), 6: Succeeded(String("75e86919-d5cf-408c-9d8e-1ac2759615b1")), 7: Succeeded(String("26dd1eee-2faf-4c35-b70b-9324674f17ef")), 8: Succeeded(String("0a0c9f59-6a31-43b0-969f-131b36ea3043")), 9: Succeeded(Array [Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("7b27527e-c873-4059-a48d-0d5039286f85"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.715196Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.715196Z")}, "ipv6_prefix": String("fdaf:bb89:e881::/48"), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "subnet_gen": Number(1), "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vni": Number(10277605)}]), 10: Succeeded(Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 11: Succeeded(Null), 12: Succeeded(Null), 13: Succeeded(Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]), 14: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]), 15: Succeeded(Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "default_subnet_id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "default_v4_route_id": String("34c74f71-dd92-4bcd-a346-3ee23370ae3c"), "default_v6_route_id": String("75e86919-d5cf-408c-9d8e-1ac2759615b1"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}], "gateway": Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route4": Null, "route6": Null, "router": Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}], "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}}, "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")} }) }
|
3590 | 2025-03-01T00:12:04.558Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 1494907
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce
response_code = 201
uri = /v1/projects
|
3591 | 2025-03-01T00:12:04.558Z | INFO | test_instance_serial (external client test context): client received response
status = 201
|
3592 | 2025-03-01T00:12:04.558Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3593 | 2025-03-01T00:12:04.559Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3594 | 2025-03-01T00:12:04.559Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3595 | 2025-03-01T00:12:04.559Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3596 | 2025-03-01T00:12:04.559Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3597 | 2025-03-01T00:12:04.559Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3598 | 2025-03-01T00:12:04.559Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3599 | 2025-03-01T00:12:04.561Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3600 | 2025-03-01T00:12:04.561Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3601 | 2025-03-01T00:12:04.562Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3602 | 2025-03-01T00:12:04.563Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3603 | 2025-03-01T00:12:04.564Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3604 | 2025-03-01T00:12:04.564Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3605 | 2025-03-01T00:12:04.564Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3606 | 2025-03-01T00:12:04.564Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3607 | 2025-03-01T00:12:04.567Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3608 | 2025-03-01T00:12:04.567Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3609 | 2025-03-01T00:12:04.567Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3610 | 2025-03-01T00:12:04.568Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3611 | 2025-03-01T00:12:04.570Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3612 | 2025-03-01T00:12:04.573Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3613 | 2025-03-01T00:12:04.573Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3614 | 2025-03-01T00:12:04.573Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3615 | 2025-03-01T00:12:04.573Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3616 | 2025-03-01T00:12:04.578Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3617 | 2025-03-01T00:12:04.579Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3618 | 2025-03-01T00:12:04.579Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3619 | 2025-03-01T00:12:04.579Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3620 | 2025-03-01T00:12:04.579Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3621 | 2025-03-01T00:12:04.582Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3622 | 2025-03-01T00:12:04.582Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3623 | 2025-03-01T00:12:04.582Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3624 | 2025-03-01T00:12:04.583Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3625 | 2025-03-01T00:12:04.585Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3626 | 2025-03-01T00:12:04.589Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3627 | 2025-03-01T00:12:04.589Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3628 | 2025-03-01T00:12:04.590Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3629 | 2025-03-01T00:12:04.591Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3630 | 2025-03-01T00:12:04.591Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3631 | 2025-03-01T00:12:04.592Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3632 | 2025-03-01T00:12:04.592Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3633 | 2025-03-01T00:12:04.593Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3634 | 2025-03-01T00:12:04.596Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3635 | 2025-03-01T00:12:04.596Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3636 | 2025-03-01T00:12:04.597Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3637 | 2025-03-01T00:12:04.600Z | INFO | test_instance_serial (dropshot_external): request completed
error_message_external = not found: instance with name "kris-picks"
error_message_internal = not found: instance with name "kris-picks"
latency_us = 41616
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb
response_code = 404
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
3638 | 2025-03-01T00:12:04.602Z | INFO | test_instance_serial (external client test context): client received response
status = 404
|
3639 | 2025-03-01T00:12:04.602Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/instances?project=springfield-squidport
|
3640 | 2025-03-01T00:12:04.602Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
uri = /v1/instances?project=springfield-squidport
|
3641 | 2025-03-01T00:12:04.602Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
uri = /v1/instances?project=springfield-squidport
|
3642 | 2025-03-01T00:12:04.602Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances?project=springfield-squidport
|
3643 | 2025-03-01T00:12:04.602Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3644 | 2025-03-01T00:12:04.602Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3645 | 2025-03-01T00:12:04.603Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3646 | 2025-03-01T00:12:04.605Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3647 | 2025-03-01T00:12:04.605Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3648 | 2025-03-01T00:12:04.605Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3649 | 2025-03-01T00:12:04.615Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
3650 | 2025-03-01T00:12:04.615Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3651 | 2025-03-01T00:12:04.615Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3652 | 2025-03-01T00:12:04.615Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3653 | 2025-03-01T00:12:04.616Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3654 | 2025-03-01T00:12:04.618Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3655 | 2025-03-01T00:12:04.618Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3656 | 2025-03-01T00:12:04.618Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3657 | 2025-03-01T00:12:04.618Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3658 | 2025-03-01T00:12:04.621Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3659 | 2025-03-01T00:12:04.624Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
3660 | 2025-03-01T00:12:04.624Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3661 | 2025-03-01T00:12:04.624Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3662 | 2025-03-01T00:12:04.624Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3663 | 2025-03-01T00:12:04.627Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
3664 | 2025-03-01T00:12:04.627Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
3665 | 2025-03-01T00:12:04.627Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3666 | 2025-03-01T00:12:04.627Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3667 | 2025-03-01T00:12:04.628Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3668 | 2025-03-01T00:12:04.629Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3669 | 2025-03-01T00:12:04.630Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
3670 | 2025-03-01T00:12:04.630Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
3671 | 2025-03-01T00:12:04.630Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
3672 | 2025-03-01T00:12:04.632Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
3673 | 2025-03-01T00:12:04.635Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
3674 | 2025-03-01T00:12:04.635Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
uri = /v1/instances?project=springfield-squidport
|
3675 | 2025-03-01T00:12:04.635Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3676 | 2025-03-01T00:12:04.635Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3677 | 2025-03-01T00:12:04.636Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3678 | 2025-03-01T00:12:04.638Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3679 | 2025-03-01T00:12:04.638Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3680 | 2025-03-01T00:12:04.639Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3681 | 2025-03-01T00:12:04.640Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }
uri = /v1/instances?project=springfield-squidport
|
3682 | 2025-03-01T00:12:04.641Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
3683 | 2025-03-01T00:12:04.641Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3684 | 2025-03-01T00:12:04.642Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3685 | 2025-03-01T00:12:04.642Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3686 | 2025-03-01T00:12:04.643Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
3687 | 2025-03-01T00:12:04.644Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3688 | 2025-03-01T00:12:04.644Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3689 | 2025-03-01T00:12:04.644Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3690 | 2025-03-01T00:12:04.645Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
3691 | 2025-03-01T00:12:04.645Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3692 | 2025-03-01T00:12:04.647Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3693 | 2025-03-01T00:12:04.647Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3694 | 2025-03-01T00:12:04.647Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3695 | 2025-03-01T00:12:04.647Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3696 | 2025-03-01T00:12:04.648Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
3697 | 2025-03-01T00:12:04.648Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3698 | 2025-03-01T00:12:04.648Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3699 | 2025-03-01T00:12:04.649Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3700 | 2025-03-01T00:12:04.650Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 4053
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
3701 | 2025-03-01T00:12:04.651Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:04 GMT"} })
|
3702 | 2025-03-01T00:12:04.651Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3703 | 2025-03-01T00:12:04.651Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3704 | 2025-03-01T00:12:04.651Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3705 | 2025-03-01T00:12:04.652Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3706 | 2025-03-01T00:12:04.652Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3707 | 2025-03-01T00:12:04.653Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
3708 | 2025-03-01T00:12:04.660Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3709 | 2025-03-01T00:12:04.660Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3710 | 2025-03-01T00:12:04.660Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3711 | 2025-03-01T00:12:04.660Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3712 | 2025-03-01T00:12:04.662Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 10739
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
3713 | 2025-03-01T00:12:04.666Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3714 | 2025-03-01T00:12:04.666Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3715 | 2025-03-01T00:12:04.666Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3716 | 2025-03-01T00:12:04.666Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0980b31-4fe4-4f92-b6da-e5aadae862a3", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:04 GMT"} })
|
3717 | 2025-03-01T00:12:04.666Z | DEBG | test_instance_serial (oximeter-agent): registered new metric producer
address = 127.0.0.1:43677
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3718 | 2025-03-01T00:12:04.700Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3719 | 2025-03-01T00:12:04.701Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3720 | 2025-03-01T00:12:04.701Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
3721 | 2025-03-01T00:12:04.701Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
uri = /v1/instances?project=springfield-squidport
|
3722 | 2025-03-01T00:12:04.703Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
3723 | 2025-03-01T00:12:04.703Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3724 | 2025-03-01T00:12:04.705Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3725 | 2025-03-01T00:12:04.705Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3726 | 2025-03-01T00:12:04.705Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
3727 | 2025-03-01T00:12:04.705Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3728 | 2025-03-01T00:12:04.705Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3729 | 2025-03-01T00:12:04.705Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3730 | 2025-03-01T00:12:04.708Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
3731 | 2025-03-01T00:12:04.710Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3732 | 2025-03-01T00:12:04.710Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
uri = /v1/instances?project=springfield-squidport
|
3733 | 2025-03-01T00:12:04.710Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
3734 | 2025-03-01T00:12:04.710Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3735 | 2025-03-01T00:12:04.710Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3736 | 2025-03-01T00:12:04.710Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3737 | 2025-03-01T00:12:04.715Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
3738 | 2025-03-01T00:12:04.716Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3739 | 2025-03-01T00:12:04.716Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3740 | 2025-03-01T00:12:04.716Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3741 | 2025-03-01T00:12:04.722Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
3742 | 2025-03-01T00:12:04.725Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3743 | 2025-03-01T00:12:04.725Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
3744 | 2025-03-01T00:12:04.725Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
3745 | 2025-03-01T00:12:04.725Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
3746 | 2025-03-01T00:12:04.726Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3747 | 2025-03-01T00:12:04.727Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3748 | 2025-03-01T00:12:04.732Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3749 | 2025-03-01T00:12:04.733Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3750 | 2025-03-01T00:12:04.733Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3751 | 2025-03-01T00:12:04.733Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
3752 | 2025-03-01T00:12:04.737Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
|
3753 | 2025-03-01T00:12:04.737Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
3754 | 2025-03-01T00:12:04.738Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
3755 | 2025-03-01T00:12:04.738Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
3756 | 2025-03-01T00:12:04.738Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
3757 | 2025-03-01T00:12:04.742Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
3758 | 2025-03-01T00:12:04.744Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
result = Ok(())
|
3759 | 2025-03-01T00:12:04.745Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
3760 | 2025-03-01T00:12:04.745Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
3761 | 2025-03-01T00:12:04.745Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
3762 | 2025-03-01T00:12:04.768Z | INFO | test_instance_serial (SagaExecutor): preparing saga
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
|
3763 | 2025-03-01T00:12:04.772Z | INFO | test_instance_serial (SEC): saga create
dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"e905f321-f9bd-462a-8fa7-37fb1aa527bc"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"056457f4-5d07-4fcc-acca-6b33df144cf3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"aa5578bc-bd1c-40b7-8751-3ba56fd7e26c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"0e7e6f1a-009c-4b85-a39b-e8ddab724ddc","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"340f2089-53e6-46c7-aee3-7dfd049a336d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"65640bb9-0378-45c3-8261-9efb465e65ae","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"b2c4a53b-e03b-455f-8070-aed5973e69a1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"2c3b4b82-e9ba-407f-b947-30f3148b99a5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"c50ec8b1-472c-4246-bf97-b09a59f176d8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"19906e2f-e287-447c-8f85-113248983528","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"9801221c-933d-40a9-a329-b622fb853e6d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"546c0e0d-28ca-463c-a196-426074b298f4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"13226f0f-e4bf-438e-9d3b-c3490af5028b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"336ec682-af00-4c62-9025-a4232710e3a8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ecc1b4c6-0c8a-440a-a156-7972fc4dfc54","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"28142d1a-50c9-405a-87cf-281906e8a0a1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"fcbb5a77-0400-4dcd-8cd0-800682e53968","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"116fcda2-9619-451e-85c0-cd15cb5232d9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"021b2af9-d20c-4025-b56b-3c727f22cdac","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"dd018198-e27f-4fdf-b1b5-750dd1dc2325","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"a53f16eb-8696-4223-a1bf-d7144301adc2","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"7bd314a0-9744-42df-a6f1-21eb9f32f77c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6d688e5b-6143-4083-ad8f-19dc3c93a5c3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"2d4f855a-29c1-4ed3-81c7-621a1b6bc715","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"db8a9bc1-068c-494a-9f2b-5518e5ae79bd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ce478a4a-7217-4d49-aea8-6fc8e4d932b3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"04de440b-d151-4381-a60c-2a42594057e0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"b5e310f4-7b22-4cc0-88c9-d9a05c10fe98","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6c368183-f470-470d-9773-9297438e6eb0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"5339ee19-a230-4fe0-88d0-10387e054c21","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"e54c4404-8313-4730-a619-56ccba15eaa3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ff10edd3-e1e3-42c5-96d0-da00460de303","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6a56b8d3-8d97-4b74-854b-b65f102adf42","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"31373b71-4861-45ae-a277-796a47c2ff8e","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"88536628-2ebe-474a-a565-621210192073","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"db49e4b5-28ff-4433-93db-cc1f95534e1b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"314e2ae8-e8b3-4f5d-bfce-203fe0acd91f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167}
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3764 | 2025-03-01T00:12:04.774Z | INFO | test_instance_serial (SecStore): creating saga
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
|
3765 | 2025-03-01T00:12:04.788Z | INFO | test_instance_serial (SagaExecutor): starting saga
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
|
3766 | 2025-03-01T00:12:04.788Z | INFO | test_instance_serial (SEC): saga start
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3767 | 2025-03-01T00:12:04.789Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N167 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3768 | 2025-03-01T00:12:04.789Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 167
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3769 | 2025-03-01T00:12:04.799Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N167 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3770 | 2025-03-01T00:12:04.799Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 167
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3771 | 2025-03-01T00:12:04.807Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3772 | 2025-03-01T00:12:04.807Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3773 | 2025-03-01T00:12:04.813Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3774 | 2025-03-01T00:12:04.813Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"))
node_id = 0
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3775 | 2025-03-01T00:12:04.821Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3776 | 2025-03-01T00:12:04.822Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3777 | 2025-03-01T00:12:04.827Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3778 | 2025-03-01T00:12:04.828Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3779 | 2025-03-01T00:12:04.828Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3780 | 2025-03-01T00:12:04.830Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3781 | 2025-03-01T00:12:04.830Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3782 | 2025-03-01T00:12:04.830Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3783 | 2025-03-01T00:12:04.836Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3784 | 2025-03-01T00:12:04.836Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3785 | 2025-03-01T00:12:04.836Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3786 | 2025-03-01T00:12:04.836Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3787 | 2025-03-01T00:12:04.837Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3788 | 2025-03-01T00:12:04.844Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3789 | 2025-03-01T00:12:04.845Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3790 | 2025-03-01T00:12:04.845Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3791 | 2025-03-01T00:12:04.845Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3792 | 2025-03-01T00:12:04.848Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3793 | 2025-03-01T00:12:04.848Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3794 | 2025-03-01T00:12:04.848Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3795 | 2025-03-01T00:12:04.849Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3796 | 2025-03-01T00:12:04.852Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3797 | 2025-03-01T00:12:04.859Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3798 | 2025-03-01T00:12:04.859Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3799 | 2025-03-01T00:12:04.859Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3800 | 2025-03-01T00:12:04.859Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3801 | 2025-03-01T00:12:04.859Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3802 | 2025-03-01T00:12:04.861Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3803 | 2025-03-01T00:12:04.862Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3804 | 2025-03-01T00:12:04.862Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3805 | 2025-03-01T00:12:04.862Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3806 | 2025-03-01T00:12:04.863Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3807 | 2025-03-01T00:12:04.865Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3808 | 2025-03-01T00:12:04.866Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3809 | 2025-03-01T00:12:04.866Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3810 | 2025-03-01T00:12:04.866Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3811 | 2025-03-01T00:12:04.868Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3812 | 2025-03-01T00:12:04.875Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3813 | 2025-03-01T00:12:04.875Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3814 | 2025-03-01T00:12:04.875Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3815 | 2025-03-01T00:12:04.876Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateInstanceRecord
|
3816 | 2025-03-01T00:12:04.961Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3817 | 2025-03-01T00:12:04.962Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]})
node_id = 1
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3818 | 2025-03-01T00:12:04.973Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3819 | 2025-03-01T00:12:04.973Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3820 | 2025-03-01T00:12:04.983Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3821 | 2025-03-01T00:12:04.983Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3822 | 2025-03-01T00:12:04.984Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3823 | 2025-03-01T00:12:04.985Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3824 | 2025-03-01T00:12:04.987Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3825 | 2025-03-01T00:12:04.987Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3826 | 2025-03-01T00:12:04.988Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3827 | 2025-03-01T00:12:04.989Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3828 | 2025-03-01T00:12:04.989Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3829 | 2025-03-01T00:12:04.989Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3830 | 2025-03-01T00:12:04.989Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3831 | 2025-03-01T00:12:04.991Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3832 | 2025-03-01T00:12:04.991Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3833 | 2025-03-01T00:12:04.991Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3834 | 2025-03-01T00:12:04.992Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3835 | 2025-03-01T00:12:04.995Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3836 | 2025-03-01T00:12:04.997Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3837 | 2025-03-01T00:12:05.002Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3838 | 2025-03-01T00:12:05.002Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3839 | 2025-03-01T00:12:05.003Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3840 | 2025-03-01T00:12:05.003Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3841 | 2025-03-01T00:12:05.003Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3842 | 2025-03-01T00:12:05.003Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3843 | 2025-03-01T00:12:05.004Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3844 | 2025-03-01T00:12:05.004Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3845 | 2025-03-01T00:12:05.004Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3846 | 2025-03-01T00:12:05.014Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3847 | 2025-03-01T00:12:05.016Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = AssociateSshKeys
|
3848 | 2025-03-01T00:12:05.016Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3849 | 2025-03-01T00:12:05.016Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3850 | 2025-03-01T00:12:05.022Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3851 | 2025-03-01T00:12:05.023Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3852 | 2025-03-01T00:12:05.040Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3853 | 2025-03-01T00:12:05.040Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)})
node_id = 3
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3854 | 2025-03-01T00:12:05.058Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3855 | 2025-03-01T00:12:05.058Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3856 | 2025-03-01T00:12:05.069Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3857 | 2025-03-01T00:12:05.070Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 4
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3858 | 2025-03-01T00:12:05.077Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3859 | 2025-03-01T00:12:05.077Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3860 | 2025-03-01T00:12:05.086Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3861 | 2025-03-01T00:12:05.086Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3862 | 2025-03-01T00:12:05.087Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3863 | 2025-03-01T00:12:05.089Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3864 | 2025-03-01T00:12:05.089Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
3865 | 2025-03-01T00:12:05.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
3866 | 2025-03-01T00:12:05.094Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3867 | 2025-03-01T00:12:05.095Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3868 | 2025-03-01T00:12:05.095Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3869 | 2025-03-01T00:12:05.098Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3870 | 2025-03-01T00:12:05.100Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3871 | 2025-03-01T00:12:05.100Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3872 | 2025-03-01T00:12:05.104Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
3873 | 2025-03-01T00:12:05.106Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
3874 | 2025-03-01T00:12:05.106Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3875 | 2025-03-01T00:12:05.106Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3876 | 2025-03-01T00:12:05.106Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3877 | 2025-03-01T00:12:05.106Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3878 | 2025-03-01T00:12:05.106Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3879 | 2025-03-01T00:12:05.109Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
3880 | 2025-03-01T00:12:05.110Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
3881 | 2025-03-01T00:12:05.110Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3882 | 2025-03-01T00:12:05.110Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3883 | 2025-03-01T00:12:05.110Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3884 | 2025-03-01T00:12:05.110Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3885 | 2025-03-01T00:12:05.123Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3886 | 2025-03-01T00:12:05.123Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3887 | 2025-03-01T00:12:05.123Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3888 | 2025-03-01T00:12:05.124Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3889 | 2025-03-01T00:12:05.127Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3890 | 2025-03-01T00:12:05.134Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3891 | 2025-03-01T00:12:05.135Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3892 | 2025-03-01T00:12:05.135Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3893 | 2025-03-01T00:12:05.135Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3894 | 2025-03-01T00:12:05.136Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3895 | 2025-03-01T00:12:05.137Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3896 | 2025-03-01T00:12:05.137Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3897 | 2025-03-01T00:12:05.139Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3898 | 2025-03-01T00:12:05.139Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3899 | 2025-03-01T00:12:05.140Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3900 | 2025-03-01T00:12:05.142Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3901 | 2025-03-01T00:12:05.142Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3902 | 2025-03-01T00:12:05.143Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3903 | 2025-03-01T00:12:05.146Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3904 | 2025-03-01T00:12:05.147Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3905 | 2025-03-01T00:12:05.147Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3906 | 2025-03-01T00:12:05.147Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3907 | 2025-03-01T00:12:05.148Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3908 | 2025-03-01T00:12:05.154Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3909 | 2025-03-01T00:12:05.154Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3910 | 2025-03-01T00:12:05.154Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3911 | 2025-03-01T00:12:05.155Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3912 | 2025-03-01T00:12:05.159Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3913 | 2025-03-01T00:12:05.160Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3914 | 2025-03-01T00:12:05.160Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3915 | 2025-03-01T00:12:05.160Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3916 | 2025-03-01T00:12:05.164Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3917 | 2025-03-01T00:12:05.182Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3918 | 2025-03-01T00:12:05.182Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3919 | 2025-03-01T00:12:05.182Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3920 | 2025-03-01T00:12:05.182Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3921 | 2025-03-01T00:12:05.182Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3922 | 2025-03-01T00:12:05.183Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3923 | 2025-03-01T00:12:05.195Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3924 | 2025-03-01T00:12:05.197Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3925 | 2025-03-01T00:12:05.197Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3926 | 2025-03-01T00:12:05.197Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3927 | 2025-03-01T00:12:05.201Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3928 | 2025-03-01T00:12:05.201Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3929 | 2025-03-01T00:12:05.202Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3930 | 2025-03-01T00:12:05.202Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3931 | 2025-03-01T00:12:05.206Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3932 | 2025-03-01T00:12:05.212Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3933 | 2025-03-01T00:12:05.212Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3934 | 2025-03-01T00:12:05.212Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3935 | 2025-03-01T00:12:05.214Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3936 | 2025-03-01T00:12:05.214Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3937 | 2025-03-01T00:12:05.214Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3938 | 2025-03-01T00:12:05.221Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3939 | 2025-03-01T00:12:05.222Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3940 | 2025-03-01T00:12:05.222Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3941 | 2025-03-01T00:12:05.222Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3942 | 2025-03-01T00:12:05.225Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3943 | 2025-03-01T00:12:05.225Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3944 | 2025-03-01T00:12:05.225Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3945 | 2025-03-01T00:12:05.226Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3946 | 2025-03-01T00:12:05.229Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3947 | 2025-03-01T00:12:05.237Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3948 | 2025-03-01T00:12:05.238Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3949 | 2025-03-01T00:12:05.240Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3950 | 2025-03-01T00:12:05.242Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3951 | 2025-03-01T00:12:05.285Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3952 | 2025-03-01T00:12:05.285Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3953 | 2025-03-01T00:12:05.287Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateNetworkInterface0
|
3954 | 2025-03-01T00:12:05.300Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3955 | 2025-03-01T00:12:05.300Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 5
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3956 | 2025-03-01T00:12:05.306Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3957 | 2025-03-01T00:12:05.307Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3958 | 2025-03-01T00:12:05.312Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3959 | 2025-03-01T00:12:05.313Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 6
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3960 | 2025-03-01T00:12:05.319Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3961 | 2025-03-01T00:12:05.323Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3962 | 2025-03-01T00:12:05.324Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3963 | 2025-03-01T00:12:05.325Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)})
node_id = 7
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3964 | 2025-03-01T00:12:05.331Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3965 | 2025-03-01T00:12:05.332Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3966 | 2025-03-01T00:12:05.335Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3967 | 2025-03-01T00:12:05.337Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 8
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3968 | 2025-03-01T00:12:05.341Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3969 | 2025-03-01T00:12:05.341Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3970 | 2025-03-01T00:12:05.347Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3971 | 2025-03-01T00:12:05.349Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 9
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3972 | 2025-03-01T00:12:05.356Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3973 | 2025-03-01T00:12:05.356Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3974 | 2025-03-01T00:12:05.362Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3975 | 2025-03-01T00:12:05.363Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 10
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3976 | 2025-03-01T00:12:05.369Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3977 | 2025-03-01T00:12:05.370Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3978 | 2025-03-01T00:12:05.375Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3979 | 2025-03-01T00:12:05.375Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)})
node_id = 11
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3980 | 2025-03-01T00:12:05.382Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N012 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3981 | 2025-03-01T00:12:05.383Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3982 | 2025-03-01T00:12:05.392Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N012 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3983 | 2025-03-01T00:12:05.392Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3984 | 2025-03-01T00:12:05.399Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N013 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3985 | 2025-03-01T00:12:05.399Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3986 | 2025-03-01T00:12:05.407Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N013 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3987 | 2025-03-01T00:12:05.408Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 13
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3988 | 2025-03-01T00:12:05.413Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N014 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3989 | 2025-03-01T00:12:05.414Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3990 | 2025-03-01T00:12:05.421Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N014 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3991 | 2025-03-01T00:12:05.421Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 14
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3992 | 2025-03-01T00:12:05.427Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N015 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3993 | 2025-03-01T00:12:05.427Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3994 | 2025-03-01T00:12:05.432Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N015 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3995 | 2025-03-01T00:12:05.433Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)})
node_id = 15
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3996 | 2025-03-01T00:12:05.438Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N016 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3997 | 2025-03-01T00:12:05.439Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
3998 | 2025-03-01T00:12:05.444Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N016 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
3999 | 2025-03-01T00:12:05.445Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 16
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4000 | 2025-03-01T00:12:05.451Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N017 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4001 | 2025-03-01T00:12:05.451Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4002 | 2025-03-01T00:12:05.457Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N017 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4003 | 2025-03-01T00:12:05.459Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 17
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4004 | 2025-03-01T00:12:05.464Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N018 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4005 | 2025-03-01T00:12:05.465Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4006 | 2025-03-01T00:12:05.469Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N018 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4007 | 2025-03-01T00:12:05.470Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4008 | 2025-03-01T00:12:05.474Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N019 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4009 | 2025-03-01T00:12:05.474Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4010 | 2025-03-01T00:12:05.480Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N019 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4011 | 2025-03-01T00:12:05.480Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)})
node_id = 19
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4012 | 2025-03-01T00:12:05.488Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N020 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4013 | 2025-03-01T00:12:05.488Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 20
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4014 | 2025-03-01T00:12:05.500Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N020 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4015 | 2025-03-01T00:12:05.500Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 20
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4016 | 2025-03-01T00:12:05.505Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N021 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4017 | 2025-03-01T00:12:05.506Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 21
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4018 | 2025-03-01T00:12:05.513Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N021 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4019 | 2025-03-01T00:12:05.514Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 21
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4020 | 2025-03-01T00:12:05.519Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N022 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4021 | 2025-03-01T00:12:05.521Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 22
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4022 | 2025-03-01T00:12:05.524Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N022 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4023 | 2025-03-01T00:12:05.524Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 22
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4024 | 2025-03-01T00:12:05.533Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N023 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4025 | 2025-03-01T00:12:05.534Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 23
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4026 | 2025-03-01T00:12:05.537Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N023 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4027 | 2025-03-01T00:12:05.538Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)})
node_id = 23
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4028 | 2025-03-01T00:12:05.544Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N024 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4029 | 2025-03-01T00:12:05.545Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 24
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4030 | 2025-03-01T00:12:05.549Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N024 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4031 | 2025-03-01T00:12:05.550Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 24
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4032 | 2025-03-01T00:12:05.555Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N025 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4033 | 2025-03-01T00:12:05.556Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 25
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4034 | 2025-03-01T00:12:05.563Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N025 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4035 | 2025-03-01T00:12:05.564Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 25
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4036 | 2025-03-01T00:12:05.570Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N026 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4037 | 2025-03-01T00:12:05.570Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 26
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4038 | 2025-03-01T00:12:05.575Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N026 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4039 | 2025-03-01T00:12:05.576Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 26
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4040 | 2025-03-01T00:12:05.584Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N027 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4041 | 2025-03-01T00:12:05.584Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 27
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4042 | 2025-03-01T00:12:05.591Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N027 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4043 | 2025-03-01T00:12:05.591Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)})
node_id = 27
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4044 | 2025-03-01T00:12:05.600Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N028 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4045 | 2025-03-01T00:12:05.600Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 28
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4046 | 2025-03-01T00:12:05.612Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N028 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4047 | 2025-03-01T00:12:05.612Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 28
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4048 | 2025-03-01T00:12:05.621Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N029 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4049 | 2025-03-01T00:12:05.625Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 29
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4050 | 2025-03-01T00:12:05.629Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N029 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4051 | 2025-03-01T00:12:05.629Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 29
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4052 | 2025-03-01T00:12:05.634Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N030 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4053 | 2025-03-01T00:12:05.636Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 30
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4054 | 2025-03-01T00:12:05.640Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N030 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4055 | 2025-03-01T00:12:05.640Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 30
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4056 | 2025-03-01T00:12:05.650Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N031 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4057 | 2025-03-01T00:12:05.650Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 31
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4058 | 2025-03-01T00:12:05.655Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N031 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4059 | 2025-03-01T00:12:05.657Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)})
node_id = 31
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4060 | 2025-03-01T00:12:05.664Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N032 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4061 | 2025-03-01T00:12:05.664Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 32
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4062 | 2025-03-01T00:12:05.673Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N032 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4063 | 2025-03-01T00:12:05.674Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 32
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4064 | 2025-03-01T00:12:05.679Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N033 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4065 | 2025-03-01T00:12:05.679Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 33
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4066 | 2025-03-01T00:12:05.686Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N033 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4067 | 2025-03-01T00:12:05.686Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 33
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4068 | 2025-03-01T00:12:05.691Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N034 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4069 | 2025-03-01T00:12:05.692Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 34
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4070 | 2025-03-01T00:12:05.698Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N034 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4071 | 2025-03-01T00:12:05.698Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 34
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4072 | 2025-03-01T00:12:05.704Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N035 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4073 | 2025-03-01T00:12:05.704Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 35
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4074 | 2025-03-01T00:12:05.709Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N035 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4075 | 2025-03-01T00:12:05.710Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("cb3d1189-9b27-419b-99d8-28973ff330dc"))
node_id = 35
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4076 | 2025-03-01T00:12:05.717Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N036 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4077 | 2025-03-01T00:12:05.721Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 36
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4078 | 2025-03-01T00:12:05.723Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4079 | 2025-03-01T00:12:05.725Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4080 | 2025-03-01T00:12:05.731Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4081 | 2025-03-01T00:12:05.732Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4082 | 2025-03-01T00:12:05.732Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4083 | 2025-03-01T00:12:05.733Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4084 | 2025-03-01T00:12:05.734Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4085 | 2025-03-01T00:12:05.735Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4086 | 2025-03-01T00:12:05.735Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4087 | 2025-03-01T00:12:05.813Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4088 | 2025-03-01T00:12:05.813Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4089 | 2025-03-01T00:12:05.814Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_node = CreateSnatIp
|
4090 | 2025-03-01T00:12:06.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4091 | 2025-03-01T00:12:06.091Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
4092 | 2025-03-01T00:12:06.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
4093 | 2025-03-01T00:12:06.093Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
4094 | 2025-03-01T00:12:06.095Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
4095 | 2025-03-01T00:12:06.110Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
4096 | 2025-03-01T00:12:06.110Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4097 | 2025-03-01T00:12:06.219Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N036 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4098 | 2025-03-01T00:12:06.224Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 36
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4099 | 2025-03-01T00:12:06.232Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N037 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4100 | 2025-03-01T00:12:06.234Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 37
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4101 | 2025-03-01T00:12:06.243Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N037 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4102 | 2025-03-01T00:12:06.243Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)})
node_id = 37
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4103 | 2025-03-01T00:12:06.249Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N038 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4104 | 2025-03-01T00:12:06.250Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 38
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4105 | 2025-03-01T00:12:06.255Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N038 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4106 | 2025-03-01T00:12:06.256Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 38
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4107 | 2025-03-01T00:12:06.260Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N039 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4108 | 2025-03-01T00:12:06.260Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 39
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4109 | 2025-03-01T00:12:06.269Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N039 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4110 | 2025-03-01T00:12:06.269Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 39
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4111 | 2025-03-01T00:12:06.276Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N040 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4112 | 2025-03-01T00:12:06.277Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 40
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4113 | 2025-03-01T00:12:06.283Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N040 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4114 | 2025-03-01T00:12:06.283Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 40
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4115 | 2025-03-01T00:12:06.289Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N041 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4116 | 2025-03-01T00:12:06.290Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 41
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4117 | 2025-03-01T00:12:06.296Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N041 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4118 | 2025-03-01T00:12:06.296Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)})
node_id = 41
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4119 | 2025-03-01T00:12:06.308Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N042 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4120 | 2025-03-01T00:12:06.308Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 42
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4121 | 2025-03-01T00:12:06.317Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N042 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4122 | 2025-03-01T00:12:06.317Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 42
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4123 | 2025-03-01T00:12:06.335Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N043 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4124 | 2025-03-01T00:12:06.335Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 43
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4125 | 2025-03-01T00:12:06.343Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N043 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4126 | 2025-03-01T00:12:06.344Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 43
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4127 | 2025-03-01T00:12:06.354Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N044 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4128 | 2025-03-01T00:12:06.354Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 44
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4129 | 2025-03-01T00:12:06.362Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N044 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4130 | 2025-03-01T00:12:06.362Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 44
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4131 | 2025-03-01T00:12:06.372Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N045 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4132 | 2025-03-01T00:12:06.372Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 45
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4133 | 2025-03-01T00:12:06.380Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N045 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4134 | 2025-03-01T00:12:06.380Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)})
node_id = 45
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4135 | 2025-03-01T00:12:06.389Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N046 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4136 | 2025-03-01T00:12:06.389Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 46
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4137 | 2025-03-01T00:12:06.396Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N046 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4138 | 2025-03-01T00:12:06.396Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 46
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4139 | 2025-03-01T00:12:06.409Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N047 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4140 | 2025-03-01T00:12:06.409Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 47
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4141 | 2025-03-01T00:12:06.420Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N047 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4142 | 2025-03-01T00:12:06.427Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 47
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4143 | 2025-03-01T00:12:06.442Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N048 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4144 | 2025-03-01T00:12:06.444Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 48
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4145 | 2025-03-01T00:12:06.448Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N048 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4146 | 2025-03-01T00:12:06.448Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 48
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4147 | 2025-03-01T00:12:06.454Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N049 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4148 | 2025-03-01T00:12:06.454Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 49
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4149 | 2025-03-01T00:12:06.460Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N049 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4150 | 2025-03-01T00:12:06.460Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)})
node_id = 49
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4151 | 2025-03-01T00:12:06.470Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N050 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4152 | 2025-03-01T00:12:06.470Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 50
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4153 | 2025-03-01T00:12:06.479Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N050 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4154 | 2025-03-01T00:12:06.480Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 50
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4155 | 2025-03-01T00:12:06.484Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N051 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4156 | 2025-03-01T00:12:06.487Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 51
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4157 | 2025-03-01T00:12:06.490Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N051 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4158 | 2025-03-01T00:12:06.491Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 51
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4159 | 2025-03-01T00:12:06.495Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N052 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4160 | 2025-03-01T00:12:06.495Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 52
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4161 | 2025-03-01T00:12:06.501Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N052 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4162 | 2025-03-01T00:12:06.501Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 52
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4163 | 2025-03-01T00:12:06.509Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N053 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4164 | 2025-03-01T00:12:06.509Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 53
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4165 | 2025-03-01T00:12:06.519Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N053 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4166 | 2025-03-01T00:12:06.519Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)})
node_id = 53
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4167 | 2025-03-01T00:12:06.525Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N054 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4168 | 2025-03-01T00:12:06.525Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 54
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4169 | 2025-03-01T00:12:06.534Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N054 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4170 | 2025-03-01T00:12:06.534Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 54
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4171 | 2025-03-01T00:12:06.541Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N055 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4172 | 2025-03-01T00:12:06.541Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 55
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4173 | 2025-03-01T00:12:06.547Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N055 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4174 | 2025-03-01T00:12:06.548Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 55
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4175 | 2025-03-01T00:12:06.552Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N056 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4176 | 2025-03-01T00:12:06.552Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 56
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4177 | 2025-03-01T00:12:06.559Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N056 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4178 | 2025-03-01T00:12:06.560Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 56
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4179 | 2025-03-01T00:12:06.566Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N057 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4180 | 2025-03-01T00:12:06.566Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 57
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4181 | 2025-03-01T00:12:06.572Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N057 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4182 | 2025-03-01T00:12:06.572Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)})
node_id = 57
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4183 | 2025-03-01T00:12:06.580Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N058 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4184 | 2025-03-01T00:12:06.580Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 58
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4185 | 2025-03-01T00:12:06.586Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N058 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4186 | 2025-03-01T00:12:06.587Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 58
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4187 | 2025-03-01T00:12:06.593Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N059 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4188 | 2025-03-01T00:12:06.594Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 59
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4189 | 2025-03-01T00:12:06.599Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N059 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4190 | 2025-03-01T00:12:06.599Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 59
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4191 | 2025-03-01T00:12:06.605Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N060 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4192 | 2025-03-01T00:12:06.606Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 60
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4193 | 2025-03-01T00:12:06.610Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N060 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4194 | 2025-03-01T00:12:06.610Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 60
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4195 | 2025-03-01T00:12:06.617Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N061 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4196 | 2025-03-01T00:12:06.618Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 61
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4197 | 2025-03-01T00:12:06.623Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N061 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4198 | 2025-03-01T00:12:06.623Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)})
node_id = 61
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4199 | 2025-03-01T00:12:06.629Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N062 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4200 | 2025-03-01T00:12:06.629Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 62
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4201 | 2025-03-01T00:12:06.636Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N062 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4202 | 2025-03-01T00:12:06.638Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 62
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4203 | 2025-03-01T00:12:06.642Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N063 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4204 | 2025-03-01T00:12:06.642Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 63
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4205 | 2025-03-01T00:12:06.646Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
4206 | 2025-03-01T00:12:06.646Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4207 | 2025-03-01T00:12:06.647Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4208 | 2025-03-01T00:12:06.648Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4209 | 2025-03-01T00:12:06.648Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4210 | 2025-03-01T00:12:06.649Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4211 | 2025-03-01T00:12:06.649Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N063 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4212 | 2025-03-01T00:12:06.649Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 63
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4213 | 2025-03-01T00:12:06.651Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 4253
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4214 | 2025-03-01T00:12:06.651Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "7198eb22-a2d1-4b8e-a1d9-ded3468a453f", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:05 GMT"} })
|
4215 | 2025-03-01T00:12:06.652Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4216 | 2025-03-01T00:12:06.652Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7762d833-18f3-48e4-be2a-fa98a619d370
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4217 | 2025-03-01T00:12:06.653Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7762d833-18f3-48e4-be2a-fa98a619d370
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4218 | 2025-03-01T00:12:06.653Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7762d833-18f3-48e4-be2a-fa98a619d370
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4219 | 2025-03-01T00:12:06.653Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7762d833-18f3-48e4-be2a-fa98a619d370
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4220 | 2025-03-01T00:12:06.654Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N064 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4221 | 2025-03-01T00:12:06.655Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 64
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4222 | 2025-03-01T00:12:06.660Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 7432
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 7762d833-18f3-48e4-be2a-fa98a619d370
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4223 | 2025-03-01T00:12:06.661Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7762d833-18f3-48e4-be2a-fa98a619d370", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:05 GMT"} })
|
4224 | 2025-03-01T00:12:06.662Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4225 | 2025-03-01T00:12:06.662Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4226 | 2025-03-01T00:12:06.662Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
4227 | 2025-03-01T00:12:06.665Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N064 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4228 | 2025-03-01T00:12:06.666Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 64
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4229 | 2025-03-01T00:12:06.672Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N065 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4230 | 2025-03-01T00:12:06.672Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 65
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4231 | 2025-03-01T00:12:06.679Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N065 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4232 | 2025-03-01T00:12:06.680Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)})
node_id = 65
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4233 | 2025-03-01T00:12:06.697Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N066 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4234 | 2025-03-01T00:12:06.697Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 66
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4235 | 2025-03-01T00:12:06.703Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N066 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4236 | 2025-03-01T00:12:06.704Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 66
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4237 | 2025-03-01T00:12:06.710Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N067 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4238 | 2025-03-01T00:12:06.710Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 67
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4239 | 2025-03-01T00:12:06.717Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N067 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4240 | 2025-03-01T00:12:06.718Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 67
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4241 | 2025-03-01T00:12:06.723Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4242 | 2025-03-01T00:12:06.723Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4243 | 2025-03-01T00:12:06.730Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N068 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4244 | 2025-03-01T00:12:06.730Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 68
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4245 | 2025-03-01T00:12:06.730Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4246 | 2025-03-01T00:12:06.731Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4247 | 2025-03-01T00:12:06.731Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4248 | 2025-03-01T00:12:06.732Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4249 | 2025-03-01T00:12:06.738Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N068 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4250 | 2025-03-01T00:12:06.749Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 68
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4251 | 2025-03-01T00:12:06.753Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N069 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4252 | 2025-03-01T00:12:06.756Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 69
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4253 | 2025-03-01T00:12:06.761Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N069 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4254 | 2025-03-01T00:12:06.762Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)})
node_id = 69
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4255 | 2025-03-01T00:12:06.772Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N070 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4256 | 2025-03-01T00:12:06.775Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 70
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4257 | 2025-03-01T00:12:06.786Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N070 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4258 | 2025-03-01T00:12:06.786Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 70
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4259 | 2025-03-01T00:12:06.792Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N071 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4260 | 2025-03-01T00:12:06.796Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 71
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4261 | 2025-03-01T00:12:06.803Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N071 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4262 | 2025-03-01T00:12:06.803Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 71
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4263 | 2025-03-01T00:12:06.810Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N072 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4264 | 2025-03-01T00:12:06.810Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 72
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4265 | 2025-03-01T00:12:06.816Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N072 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4266 | 2025-03-01T00:12:06.816Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 72
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4267 | 2025-03-01T00:12:06.823Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N073 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4268 | 2025-03-01T00:12:06.824Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 73
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4269 | 2025-03-01T00:12:06.828Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N073 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4270 | 2025-03-01T00:12:06.829Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)})
node_id = 73
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4271 | 2025-03-01T00:12:06.834Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N074 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4272 | 2025-03-01T00:12:06.834Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 74
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4273 | 2025-03-01T00:12:06.844Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N074 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4274 | 2025-03-01T00:12:06.844Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 74
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4275 | 2025-03-01T00:12:06.851Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N075 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4276 | 2025-03-01T00:12:06.851Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 75
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4277 | 2025-03-01T00:12:06.858Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N075 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4278 | 2025-03-01T00:12:06.858Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 75
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4279 | 2025-03-01T00:12:06.866Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N076 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4280 | 2025-03-01T00:12:06.866Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 76
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4281 | 2025-03-01T00:12:06.871Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N076 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4282 | 2025-03-01T00:12:06.872Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 76
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4283 | 2025-03-01T00:12:06.878Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N077 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4284 | 2025-03-01T00:12:06.878Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 77
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4285 | 2025-03-01T00:12:06.884Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N077 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4286 | 2025-03-01T00:12:06.885Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)})
node_id = 77
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4287 | 2025-03-01T00:12:06.891Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N078 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4288 | 2025-03-01T00:12:06.892Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 78
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4289 | 2025-03-01T00:12:06.898Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N078 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4290 | 2025-03-01T00:12:06.898Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 78
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4291 | 2025-03-01T00:12:06.903Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N079 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4292 | 2025-03-01T00:12:06.903Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 79
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4293 | 2025-03-01T00:12:06.910Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N079 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4294 | 2025-03-01T00:12:06.910Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 79
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4295 | 2025-03-01T00:12:06.919Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N080 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4296 | 2025-03-01T00:12:06.919Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 80
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4297 | 2025-03-01T00:12:06.926Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N080 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4298 | 2025-03-01T00:12:06.927Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 80
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4299 | 2025-03-01T00:12:06.935Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N081 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4300 | 2025-03-01T00:12:06.935Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 81
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4301 | 2025-03-01T00:12:06.939Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N081 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4302 | 2025-03-01T00:12:06.940Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)})
node_id = 81
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4303 | 2025-03-01T00:12:06.949Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N082 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4304 | 2025-03-01T00:12:06.950Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 82
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4305 | 2025-03-01T00:12:06.957Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N082 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4306 | 2025-03-01T00:12:06.957Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 82
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4307 | 2025-03-01T00:12:06.965Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N083 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4308 | 2025-03-01T00:12:06.966Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 83
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4309 | 2025-03-01T00:12:06.973Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N083 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4310 | 2025-03-01T00:12:06.973Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 83
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4311 | 2025-03-01T00:12:06.980Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N084 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4312 | 2025-03-01T00:12:06.980Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 84
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4313 | 2025-03-01T00:12:06.986Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N084 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4314 | 2025-03-01T00:12:06.987Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 84
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4315 | 2025-03-01T00:12:06.997Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N085 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4316 | 2025-03-01T00:12:06.997Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 85
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4317 | 2025-03-01T00:12:07.005Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N085 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4318 | 2025-03-01T00:12:07.007Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)})
node_id = 85
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4319 | 2025-03-01T00:12:07.013Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N086 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4320 | 2025-03-01T00:12:07.015Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 86
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4321 | 2025-03-01T00:12:07.019Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N086 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4322 | 2025-03-01T00:12:07.019Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 86
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4323 | 2025-03-01T00:12:07.026Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N087 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4324 | 2025-03-01T00:12:07.027Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 87
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4325 | 2025-03-01T00:12:07.032Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N087 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4326 | 2025-03-01T00:12:07.033Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 87
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4327 | 2025-03-01T00:12:07.037Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N088 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4328 | 2025-03-01T00:12:07.037Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 88
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4329 | 2025-03-01T00:12:07.045Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N088 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4330 | 2025-03-01T00:12:07.045Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 88
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4331 | 2025-03-01T00:12:07.052Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N089 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4332 | 2025-03-01T00:12:07.052Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 89
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4333 | 2025-03-01T00:12:07.061Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N089 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4334 | 2025-03-01T00:12:07.062Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)})
node_id = 89
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4335 | 2025-03-01T00:12:07.066Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N090 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4336 | 2025-03-01T00:12:07.066Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 90
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4337 | 2025-03-01T00:12:07.071Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N090 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4338 | 2025-03-01T00:12:07.071Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 90
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4339 | 2025-03-01T00:12:07.078Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N091 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4340 | 2025-03-01T00:12:07.078Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 91
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4341 | 2025-03-01T00:12:07.084Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N091 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4342 | 2025-03-01T00:12:07.085Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 91
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4343 | 2025-03-01T00:12:07.089Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4344 | 2025-03-01T00:12:07.089Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
4345 | 2025-03-01T00:12:07.090Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
4346 | 2025-03-01T00:12:07.091Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N092 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4347 | 2025-03-01T00:12:07.092Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 92
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4348 | 2025-03-01T00:12:07.103Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
4349 | 2025-03-01T00:12:07.103Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
4350 | 2025-03-01T00:12:07.103Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N092 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4351 | 2025-03-01T00:12:07.105Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 92
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4352 | 2025-03-01T00:12:07.110Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N093 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4353 | 2025-03-01T00:12:07.110Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 93
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4354 | 2025-03-01T00:12:07.110Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
4355 | 2025-03-01T00:12:07.110Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4356 | 2025-03-01T00:12:07.116Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N093 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4357 | 2025-03-01T00:12:07.116Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)})
node_id = 93
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4358 | 2025-03-01T00:12:07.123Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N094 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4359 | 2025-03-01T00:12:07.123Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 94
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4360 | 2025-03-01T00:12:07.130Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N094 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4361 | 2025-03-01T00:12:07.131Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 94
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4362 | 2025-03-01T00:12:07.135Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N095 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4363 | 2025-03-01T00:12:07.136Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 95
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4364 | 2025-03-01T00:12:07.142Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N095 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4365 | 2025-03-01T00:12:07.150Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 95
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4366 | 2025-03-01T00:12:07.155Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N096 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4367 | 2025-03-01T00:12:07.156Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 96
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4368 | 2025-03-01T00:12:07.160Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N096 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4369 | 2025-03-01T00:12:07.161Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 96
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4370 | 2025-03-01T00:12:07.170Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N097 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4371 | 2025-03-01T00:12:07.171Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 97
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4372 | 2025-03-01T00:12:07.180Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N097 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4373 | 2025-03-01T00:12:07.181Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)})
node_id = 97
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4374 | 2025-03-01T00:12:07.202Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N098 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4375 | 2025-03-01T00:12:07.202Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 98
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4376 | 2025-03-01T00:12:07.208Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N098 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4377 | 2025-03-01T00:12:07.209Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 98
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4378 | 2025-03-01T00:12:07.217Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N099 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4379 | 2025-03-01T00:12:07.217Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 99
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4380 | 2025-03-01T00:12:07.229Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N099 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4381 | 2025-03-01T00:12:07.230Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 99
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4382 | 2025-03-01T00:12:07.245Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N100 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4383 | 2025-03-01T00:12:07.245Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 100
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4384 | 2025-03-01T00:12:07.256Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N100 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4385 | 2025-03-01T00:12:07.256Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 100
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4386 | 2025-03-01T00:12:07.266Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N101 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4387 | 2025-03-01T00:12:07.266Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 101
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4388 | 2025-03-01T00:12:07.275Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N101 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4389 | 2025-03-01T00:12:07.276Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)})
node_id = 101
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4390 | 2025-03-01T00:12:07.282Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N102 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4391 | 2025-03-01T00:12:07.282Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 102
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4392 | 2025-03-01T00:12:07.288Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N102 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4393 | 2025-03-01T00:12:07.288Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 102
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4394 | 2025-03-01T00:12:07.297Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N103 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4395 | 2025-03-01T00:12:07.297Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 103
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4396 | 2025-03-01T00:12:07.303Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N103 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4397 | 2025-03-01T00:12:07.304Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 103
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4398 | 2025-03-01T00:12:07.311Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N104 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4399 | 2025-03-01T00:12:07.311Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 104
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4400 | 2025-03-01T00:12:07.319Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N104 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4401 | 2025-03-01T00:12:07.319Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 104
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4402 | 2025-03-01T00:12:07.326Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N105 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4403 | 2025-03-01T00:12:07.326Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 105
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4404 | 2025-03-01T00:12:07.334Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N105 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4405 | 2025-03-01T00:12:07.335Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)})
node_id = 105
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4406 | 2025-03-01T00:12:07.342Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N106 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4407 | 2025-03-01T00:12:07.342Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 106
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4408 | 2025-03-01T00:12:07.351Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N106 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4409 | 2025-03-01T00:12:07.352Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 106
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4410 | 2025-03-01T00:12:07.359Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N107 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4411 | 2025-03-01T00:12:07.359Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 107
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4412 | 2025-03-01T00:12:07.370Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N107 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4413 | 2025-03-01T00:12:07.371Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 107
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4414 | 2025-03-01T00:12:07.376Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N108 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4415 | 2025-03-01T00:12:07.378Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 108
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4416 | 2025-03-01T00:12:07.383Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N108 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4417 | 2025-03-01T00:12:07.385Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 108
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4418 | 2025-03-01T00:12:07.390Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N109 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4419 | 2025-03-01T00:12:07.390Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 109
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4420 | 2025-03-01T00:12:07.396Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N109 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4421 | 2025-03-01T00:12:07.396Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)})
node_id = 109
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4422 | 2025-03-01T00:12:07.405Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N110 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4423 | 2025-03-01T00:12:07.406Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 110
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4424 | 2025-03-01T00:12:07.414Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N110 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4425 | 2025-03-01T00:12:07.414Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 110
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4426 | 2025-03-01T00:12:07.420Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N111 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4427 | 2025-03-01T00:12:07.420Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 111
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4428 | 2025-03-01T00:12:07.429Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N111 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4429 | 2025-03-01T00:12:07.429Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 111
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4430 | 2025-03-01T00:12:07.447Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N112 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4431 | 2025-03-01T00:12:07.449Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 112
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4432 | 2025-03-01T00:12:07.457Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N112 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4433 | 2025-03-01T00:12:07.457Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 112
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4434 | 2025-03-01T00:12:07.465Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N113 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4435 | 2025-03-01T00:12:07.466Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 113
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4436 | 2025-03-01T00:12:07.473Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N113 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4437 | 2025-03-01T00:12:07.475Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)})
node_id = 113
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4438 | 2025-03-01T00:12:07.481Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N114 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4439 | 2025-03-01T00:12:07.481Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 114
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4440 | 2025-03-01T00:12:07.488Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N114 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4441 | 2025-03-01T00:12:07.490Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 114
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4442 | 2025-03-01T00:12:07.494Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N115 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4443 | 2025-03-01T00:12:07.494Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 115
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4444 | 2025-03-01T00:12:07.506Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N115 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4445 | 2025-03-01T00:12:07.506Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 115
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4446 | 2025-03-01T00:12:07.516Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N116 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4447 | 2025-03-01T00:12:07.516Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 116
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4448 | 2025-03-01T00:12:07.522Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N116 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4449 | 2025-03-01T00:12:07.524Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 116
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4450 | 2025-03-01T00:12:07.530Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N117 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4451 | 2025-03-01T00:12:07.530Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 117
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4452 | 2025-03-01T00:12:07.535Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N117 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4453 | 2025-03-01T00:12:07.535Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)})
node_id = 117
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4454 | 2025-03-01T00:12:07.540Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N118 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4455 | 2025-03-01T00:12:07.541Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 118
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4456 | 2025-03-01T00:12:07.551Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N118 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4457 | 2025-03-01T00:12:07.553Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 118
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4458 | 2025-03-01T00:12:07.557Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N119 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4459 | 2025-03-01T00:12:07.558Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 119
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4460 | 2025-03-01T00:12:07.563Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N119 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4461 | 2025-03-01T00:12:07.564Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 119
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4462 | 2025-03-01T00:12:07.570Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N120 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4463 | 2025-03-01T00:12:07.570Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 120
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4464 | 2025-03-01T00:12:07.575Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N120 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4465 | 2025-03-01T00:12:07.575Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 120
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4466 | 2025-03-01T00:12:07.581Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N121 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4467 | 2025-03-01T00:12:07.581Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 121
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4468 | 2025-03-01T00:12:07.586Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N121 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4469 | 2025-03-01T00:12:07.587Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)})
node_id = 121
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4470 | 2025-03-01T00:12:07.592Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N122 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4471 | 2025-03-01T00:12:07.593Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 122
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4472 | 2025-03-01T00:12:07.598Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N122 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4473 | 2025-03-01T00:12:07.598Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 122
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4474 | 2025-03-01T00:12:07.605Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N123 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4475 | 2025-03-01T00:12:07.607Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 123
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4476 | 2025-03-01T00:12:07.614Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N123 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4477 | 2025-03-01T00:12:07.614Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 123
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4478 | 2025-03-01T00:12:07.622Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N124 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4479 | 2025-03-01T00:12:07.622Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 124
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4480 | 2025-03-01T00:12:07.628Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N124 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4481 | 2025-03-01T00:12:07.628Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 124
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4482 | 2025-03-01T00:12:07.635Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N125 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4483 | 2025-03-01T00:12:07.636Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 125
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4484 | 2025-03-01T00:12:07.643Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N125 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4485 | 2025-03-01T00:12:07.643Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)})
node_id = 125
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4486 | 2025-03-01T00:12:07.658Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N126 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4487 | 2025-03-01T00:12:07.659Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 126
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4488 | 2025-03-01T00:12:07.670Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N126 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4489 | 2025-03-01T00:12:07.671Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 126
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4490 | 2025-03-01T00:12:07.675Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N127 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4491 | 2025-03-01T00:12:07.675Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 127
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4492 | 2025-03-01T00:12:07.681Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N127 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4493 | 2025-03-01T00:12:07.682Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 127
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4494 | 2025-03-01T00:12:07.688Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N128 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4495 | 2025-03-01T00:12:07.688Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 128
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4496 | 2025-03-01T00:12:07.697Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N128 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4497 | 2025-03-01T00:12:07.697Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 128
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4498 | 2025-03-01T00:12:07.703Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N129 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4499 | 2025-03-01T00:12:07.704Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 129
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4500 | 2025-03-01T00:12:07.711Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N129 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4501 | 2025-03-01T00:12:07.711Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)})
node_id = 129
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4502 | 2025-03-01T00:12:07.719Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N130 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4503 | 2025-03-01T00:12:07.720Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 130
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4504 | 2025-03-01T00:12:07.723Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4505 | 2025-03-01T00:12:07.723Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4506 | 2025-03-01T00:12:07.731Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N130 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4507 | 2025-03-01T00:12:07.731Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 130
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4508 | 2025-03-01T00:12:07.731Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4509 | 2025-03-01T00:12:07.732Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4510 | 2025-03-01T00:12:07.732Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4511 | 2025-03-01T00:12:07.732Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4512 | 2025-03-01T00:12:07.745Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N131 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4513 | 2025-03-01T00:12:07.745Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 131
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4514 | 2025-03-01T00:12:07.755Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N131 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4515 | 2025-03-01T00:12:07.755Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 131
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4516 | 2025-03-01T00:12:07.760Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N132 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4517 | 2025-03-01T00:12:07.760Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 132
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4518 | 2025-03-01T00:12:07.769Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N132 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4519 | 2025-03-01T00:12:07.770Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 132
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4520 | 2025-03-01T00:12:07.784Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N133 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4521 | 2025-03-01T00:12:07.784Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 133
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4522 | 2025-03-01T00:12:07.791Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N133 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4523 | 2025-03-01T00:12:07.791Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)})
node_id = 133
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4524 | 2025-03-01T00:12:07.796Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N134 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4525 | 2025-03-01T00:12:07.796Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 134
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4526 | 2025-03-01T00:12:07.806Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N134 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4527 | 2025-03-01T00:12:07.806Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 134
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4528 | 2025-03-01T00:12:07.810Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N135 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4529 | 2025-03-01T00:12:07.810Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 135
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4530 | 2025-03-01T00:12:07.818Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N135 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4531 | 2025-03-01T00:12:07.818Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 135
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4532 | 2025-03-01T00:12:07.830Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N136 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4533 | 2025-03-01T00:12:07.830Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 136
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4534 | 2025-03-01T00:12:07.837Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N136 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4535 | 2025-03-01T00:12:07.838Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 136
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4536 | 2025-03-01T00:12:07.843Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N137 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4537 | 2025-03-01T00:12:07.843Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 137
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4538 | 2025-03-01T00:12:07.848Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N137 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4539 | 2025-03-01T00:12:07.849Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)})
node_id = 137
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4540 | 2025-03-01T00:12:07.864Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N138 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4541 | 2025-03-01T00:12:07.864Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 138
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4542 | 2025-03-01T00:12:07.875Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N138 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4543 | 2025-03-01T00:12:07.877Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 138
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4544 | 2025-03-01T00:12:07.887Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N139 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4545 | 2025-03-01T00:12:07.887Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 139
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4546 | 2025-03-01T00:12:07.892Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N139 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4547 | 2025-03-01T00:12:07.893Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 139
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4548 | 2025-03-01T00:12:07.898Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N140 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4549 | 2025-03-01T00:12:07.899Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 140
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4550 | 2025-03-01T00:12:07.906Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N140 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4551 | 2025-03-01T00:12:07.906Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 140
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4552 | 2025-03-01T00:12:07.913Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N141 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4553 | 2025-03-01T00:12:07.913Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 141
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4554 | 2025-03-01T00:12:07.921Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N141 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4555 | 2025-03-01T00:12:07.921Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)})
node_id = 141
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4556 | 2025-03-01T00:12:07.932Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N142 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4557 | 2025-03-01T00:12:07.933Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 142
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4558 | 2025-03-01T00:12:07.940Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N142 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4559 | 2025-03-01T00:12:07.940Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 142
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4560 | 2025-03-01T00:12:07.945Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N143 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4561 | 2025-03-01T00:12:07.946Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 143
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4562 | 2025-03-01T00:12:07.953Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N143 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4563 | 2025-03-01T00:12:07.953Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 143
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4564 | 2025-03-01T00:12:07.959Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N144 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4565 | 2025-03-01T00:12:07.960Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 144
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4566 | 2025-03-01T00:12:07.965Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N144 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4567 | 2025-03-01T00:12:07.966Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 144
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4568 | 2025-03-01T00:12:07.971Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N145 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4569 | 2025-03-01T00:12:07.972Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 145
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4570 | 2025-03-01T00:12:07.977Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N145 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4571 | 2025-03-01T00:12:07.977Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)})
node_id = 145
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4572 | 2025-03-01T00:12:07.992Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N146 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4573 | 2025-03-01T00:12:07.996Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 146
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4574 | 2025-03-01T00:12:08.000Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N146 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4575 | 2025-03-01T00:12:08.000Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 146
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4576 | 2025-03-01T00:12:08.010Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N147 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4577 | 2025-03-01T00:12:08.010Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 147
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4578 | 2025-03-01T00:12:08.017Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N147 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4579 | 2025-03-01T00:12:08.017Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 147
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4580 | 2025-03-01T00:12:08.023Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N148 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4581 | 2025-03-01T00:12:08.023Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 148
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4582 | 2025-03-01T00:12:08.029Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N148 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4583 | 2025-03-01T00:12:08.029Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 148
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4584 | 2025-03-01T00:12:08.036Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N149 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4585 | 2025-03-01T00:12:08.036Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 149
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4586 | 2025-03-01T00:12:08.042Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N149 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4587 | 2025-03-01T00:12:08.042Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)})
node_id = 149
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4588 | 2025-03-01T00:12:08.051Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N150 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4589 | 2025-03-01T00:12:08.052Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 150
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4590 | 2025-03-01T00:12:08.057Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N150 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4591 | 2025-03-01T00:12:08.058Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 150
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4592 | 2025-03-01T00:12:08.065Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N151 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4593 | 2025-03-01T00:12:08.065Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 151
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4594 | 2025-03-01T00:12:08.072Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N151 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4595 | 2025-03-01T00:12:08.072Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 151
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4596 | 2025-03-01T00:12:08.078Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N152 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4597 | 2025-03-01T00:12:08.078Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 152
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4598 | 2025-03-01T00:12:08.087Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N152 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4599 | 2025-03-01T00:12:08.087Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 152
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4600 | 2025-03-01T00:12:08.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4601 | 2025-03-01T00:12:08.092Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
4602 | 2025-03-01T00:12:08.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
4603 | 2025-03-01T00:12:08.093Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
4604 | 2025-03-01T00:12:08.093Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
4605 | 2025-03-01T00:12:08.097Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N153 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4606 | 2025-03-01T00:12:08.097Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 153
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4607 | 2025-03-01T00:12:08.103Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N153 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4608 | 2025-03-01T00:12:08.104Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)})
node_id = 153
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4609 | 2025-03-01T00:12:08.110Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N154 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4610 | 2025-03-01T00:12:08.110Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 154
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4611 | 2025-03-01T00:12:08.116Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N154 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4612 | 2025-03-01T00:12:08.117Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 154
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4613 | 2025-03-01T00:12:08.123Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N155 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4614 | 2025-03-01T00:12:08.123Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 155
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4615 | 2025-03-01T00:12:08.131Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N155 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4616 | 2025-03-01T00:12:08.132Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 155
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4617 | 2025-03-01T00:12:08.132Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
4618 | 2025-03-01T00:12:08.132Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4619 | 2025-03-01T00:12:08.138Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N156 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4620 | 2025-03-01T00:12:08.138Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 156
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4621 | 2025-03-01T00:12:08.144Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N156 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4622 | 2025-03-01T00:12:08.144Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 156
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4623 | 2025-03-01T00:12:08.150Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N157 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4624 | 2025-03-01T00:12:08.150Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 157
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4625 | 2025-03-01T00:12:08.158Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N157 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4626 | 2025-03-01T00:12:08.159Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)})
node_id = 157
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4627 | 2025-03-01T00:12:08.172Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N158 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4628 | 2025-03-01T00:12:08.172Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 158
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4629 | 2025-03-01T00:12:08.180Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N158 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4630 | 2025-03-01T00:12:08.180Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 158
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4631 | 2025-03-01T00:12:08.192Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N159 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4632 | 2025-03-01T00:12:08.193Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 159
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4633 | 2025-03-01T00:12:08.204Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N159 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4634 | 2025-03-01T00:12:08.204Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 159
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4635 | 2025-03-01T00:12:08.209Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N160 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4636 | 2025-03-01T00:12:08.209Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 160
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4637 | 2025-03-01T00:12:08.214Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N160 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4638 | 2025-03-01T00:12:08.214Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 160
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4639 | 2025-03-01T00:12:08.225Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N161 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4640 | 2025-03-01T00:12:08.225Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 161
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4641 | 2025-03-01T00:12:08.231Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N161 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4642 | 2025-03-01T00:12:08.231Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)})
node_id = 161
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4643 | 2025-03-01T00:12:08.242Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N162 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4644 | 2025-03-01T00:12:08.242Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 162
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4645 | 2025-03-01T00:12:08.247Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N162 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4646 | 2025-03-01T00:12:08.248Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 162
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4647 | 2025-03-01T00:12:08.254Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N163 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4648 | 2025-03-01T00:12:08.254Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 163
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4649 | 2025-03-01T00:12:08.265Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N163 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4650 | 2025-03-01T00:12:08.265Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 163
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4651 | 2025-03-01T00:12:08.269Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N164 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4652 | 2025-03-01T00:12:08.269Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 164
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4653 | 2025-03-01T00:12:08.274Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N164 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4654 | 2025-03-01T00:12:08.274Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 164
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4655 | 2025-03-01T00:12:08.281Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N165 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4656 | 2025-03-01T00:12:08.281Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 165
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4657 | 2025-03-01T00:12:08.287Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N165 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4658 | 2025-03-01T00:12:08.289Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 165
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4659 | 2025-03-01T00:12:08.293Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N166 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4660 | 2025-03-01T00:12:08.294Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 166
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4661 | 2025-03-01T00:12:08.315Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N166 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4662 | 2025-03-01T00:12:08.316Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 166
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4663 | 2025-03-01T00:12:08.324Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N168 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4664 | 2025-03-01T00:12:08.325Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 168
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4665 | 2025-03-01T00:12:08.331Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N168 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4666 | 2025-03-01T00:12:08.331Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 168
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4667 | 2025-03-01T00:12:08.336Z | INFO | test_instance_serial (SEC): update for saga cached state
new_state = Done
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4668 | 2025-03-01T00:12:08.337Z | INFO | test_instance_serial (SecStore): updating state
new_state = done
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
|
4669 | 2025-03-01T00:12:08.360Z | INFO | test_instance_serial (SEC): saga finished
result = success
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4670 | 2025-03-01T00:12:08.360Z | INFO | test_instance_serial (SagaExecutor): saga finished
saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
saga_name = instance-create
saga_result = SagaResult { saga_id: 86b57918-e438-4efd-8e0f-9470c5899c99, saga_log: SagaLog { saga_id: 86b57918-e438-4efd-8e0f-9470c5899c99, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("e905f321-f9bd-462a-8fa7-37fb1aa527bc")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("cb3d1189-9b27-419b-99d8-28973ff330dc")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Null), 40: Succeeded(Null), 41: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Null, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Null, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("cb3d1189-9b27-419b-99d8-28973ff330dc"), "stopped_instance": Null} }) }
|
4671 | 2025-03-01T00:12:08.367Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4672 | 2025-03-01T00:12:08.368Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4673 | 2025-03-01T00:12:08.368Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4674 | 2025-03-01T00:12:08.368Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4675 | 2025-03-01T00:12:08.369Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4676 | 2025-03-01T00:12:08.369Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4677 | 2025-03-01T00:12:08.369Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4678 | 2025-03-01T00:12:08.369Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4679 | 2025-03-01T00:12:08.369Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4680 | 2025-03-01T00:12:08.369Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
uri = /v1/instances?project=springfield-squidport
|
4681 | 2025-03-01T00:12:08.369Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
4682 | 2025-03-01T00:12:08.370Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4683 | 2025-03-01T00:12:08.370Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4684 | 2025-03-01T00:12:08.370Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4685 | 2025-03-01T00:12:08.373Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
4686 | 2025-03-01T00:12:08.373Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4687 | 2025-03-01T00:12:08.373Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4688 | 2025-03-01T00:12:08.373Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4689 | 2025-03-01T00:12:08.376Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
4690 | 2025-03-01T00:12:08.376Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4691 | 2025-03-01T00:12:08.376Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4692 | 2025-03-01T00:12:08.376Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4693 | 2025-03-01T00:12:08.383Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
4694 | 2025-03-01T00:12:08.395Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4695 | 2025-03-01T00:12:08.395Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
uri = /v1/instances?project=springfield-squidport
|
4696 | 2025-03-01T00:12:08.395Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
4697 | 2025-03-01T00:12:08.395Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4698 | 2025-03-01T00:12:08.395Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4699 | 2025-03-01T00:12:08.396Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4700 | 2025-03-01T00:12:08.399Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
4701 | 2025-03-01T00:12:08.399Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4702 | 2025-03-01T00:12:08.400Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4703 | 2025-03-01T00:12:08.400Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4704 | 2025-03-01T00:12:08.403Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
4705 | 2025-03-01T00:12:08.403Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4706 | 2025-03-01T00:12:08.403Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4707 | 2025-03-01T00:12:08.405Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4708 | 2025-03-01T00:12:08.406Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
4709 | 2025-03-01T00:12:08.414Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4710 | 2025-03-01T00:12:08.414Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
4711 | 2025-03-01T00:12:08.414Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
4712 | 2025-03-01T00:12:08.415Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
4713 | 2025-03-01T00:12:08.421Z | INFO | test_instance_serial (SagaExecutor): preparing saga
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
|
4714 | 2025-03-01T00:12:08.421Z | INFO | test_instance_serial (SEC): saga create
dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"the-host","identity":{"description":"instance \\"kris-picks\\"","id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","name":"kris-picks","time_created":"2025-03-01T00:12:04.827858Z","time_deleted":null,"time_modified":"2025-03-01T00:12:04.827858Z"},"memory":1073741824,"ncpus":4,"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-01T00:12:04.827858Z"},"updater_gen":1,"updater_id":null,"user_data":[35,99,108,111,117,100,45,99,111,110,102,105,103,10,115,121,115,116,101,109,95,105,110,102,111,58,10,32,32,100,101,102,97,117,108,116,95,117,115,101,114,58,10,32,32,32,32,110,97,109,101,58,32,111,120,105,100,101]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10}
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4715 | 2025-03-01T00:12:08.422Z | INFO | test_instance_serial (SecStore): creating saga
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
|
4716 | 2025-03-01T00:12:08.475Z | INFO | test_instance_serial (SagaExecutor): starting saga
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
|
4717 | 2025-03-01T00:12:08.475Z | INFO | test_instance_serial (SEC): saga start
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4718 | 2025-03-01T00:12:08.475Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4719 | 2025-03-01T00:12:08.475Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4720 | 2025-03-01T00:12:08.482Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N010 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4721 | 2025-03-01T00:12:08.482Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 10
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4722 | 2025-03-01T00:12:08.490Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4723 | 2025-03-01T00:12:08.491Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4724 | 2025-03-01T00:12:08.499Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N000 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4725 | 2025-03-01T00:12:08.499Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"))
node_id = 0
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4726 | 2025-03-01T00:12:08.505Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4727 | 2025-03-01T00:12:08.505Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4728 | 2025-03-01T00:12:08.512Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4729 | 2025-03-01T00:12:08.513Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4730 | 2025-03-01T00:12:08.513Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4731 | 2025-03-01T00:12:08.552Z | INFO | test_instance_serial (InstanceAllocator): found 1 available sled targets
sled_ids = [b6d65341-167c-41df-9b5c-41cded99c229]
|
4732 | 2025-03-01T00:12:08.622Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N001 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4733 | 2025-03-01T00:12:08.622Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229"))
node_id = 1
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4734 | 2025-03-01T00:12:08.629Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4735 | 2025-03-01T00:12:08.629Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4736 | 2025-03-01T00:12:08.636Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AllocPropolisIp
|
4737 | 2025-03-01T00:12:08.637Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AllocPropolisIp
|
4738 | 2025-03-01T00:12:08.637Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AllocPropolisIp
|
4739 | 2025-03-01T00:12:08.648Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
4740 | 2025-03-01T00:12:08.649Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4741 | 2025-03-01T00:12:08.649Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N002 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4742 | 2025-03-01T00:12:08.649Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(String("::1:0"))
node_id = 2
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4743 | 2025-03-01T00:12:08.650Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 6b653a2f-02c0-4c51-b272-67b97004c274
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4744 | 2025-03-01T00:12:08.651Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 6b653a2f-02c0-4c51-b272-67b97004c274
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4745 | 2025-03-01T00:12:08.651Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 6b653a2f-02c0-4c51-b272-67b97004c274
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4746 | 2025-03-01T00:12:08.651Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 6b653a2f-02c0-4c51-b272-67b97004c274
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4747 | 2025-03-01T00:12:08.654Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 4520
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 6b653a2f-02c0-4c51-b272-67b97004c274
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
4748 | 2025-03-01T00:12:08.655Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b653a2f-02c0-4c51-b272-67b97004c274", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:07 GMT"} })
|
4749 | 2025-03-01T00:12:08.655Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4750 | 2025-03-01T00:12:08.656Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4751 | 2025-03-01T00:12:08.656Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4752 | 2025-03-01T00:12:08.656Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 376fc848-e0f9-44dd-883f-49e14a90060f
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4753 | 2025-03-01T00:12:08.657Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 376fc848-e0f9-44dd-883f-49e14a90060f
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4754 | 2025-03-01T00:12:08.657Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 376fc848-e0f9-44dd-883f-49e14a90060f
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4755 | 2025-03-01T00:12:08.657Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 376fc848-e0f9-44dd-883f-49e14a90060f
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4756 | 2025-03-01T00:12:08.661Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 4962
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 376fc848-e0f9-44dd-883f-49e14a90060f
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
4757 | 2025-03-01T00:12:08.662Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "376fc848-e0f9-44dd-883f-49e14a90060f", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:07 GMT"} })
|
4758 | 2025-03-01T00:12:08.663Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4759 | 2025-03-01T00:12:08.663Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4760 | 2025-03-01T00:12:08.663Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
4761 | 2025-03-01T00:12:08.663Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = CreateVmmRecord
|
4762 | 2025-03-01T00:12:08.663Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = CreateVmmRecord
|
4763 | 2025-03-01T00:12:08.663Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = CreateVmmRecord
|
4764 | 2025-03-01T00:12:08.722Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4765 | 2025-03-01T00:12:08.733Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4766 | 2025-03-01T00:12:08.733Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4767 | 2025-03-01T00:12:08.733Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4768 | 2025-03-01T00:12:08.733Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4769 | 2025-03-01T00:12:08.733Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
4770 | 2025-03-01T00:12:08.737Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N003 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4771 | 2025-03-01T00:12:08.737Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null})
node_id = 3
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4772 | 2025-03-01T00:12:08.746Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4773 | 2025-03-01T00:12:08.746Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4774 | 2025-03-01T00:12:08.764Z | INFO | test_instance_serial (SagaExecutor): moving instance to Starting state via saga
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
start_reason = AutoStart
|
4775 | 2025-03-01T00:12:08.764Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4776 | 2025-03-01T00:12:08.764Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4777 | 2025-03-01T00:12:08.765Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4778 | 2025-03-01T00:12:08.768Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4779 | 2025-03-01T00:12:08.768Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4780 | 2025-03-01T00:12:08.769Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4781 | 2025-03-01T00:12:08.771Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4782 | 2025-03-01T00:12:08.771Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4783 | 2025-03-01T00:12:08.772Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4784 | 2025-03-01T00:12:08.773Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4785 | 2025-03-01T00:12:08.774Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4786 | 2025-03-01T00:12:08.774Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4787 | 2025-03-01T00:12:08.774Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4788 | 2025-03-01T00:12:08.774Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4789 | 2025-03-01T00:12:08.776Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4790 | 2025-03-01T00:12:08.777Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4791 | 2025-03-01T00:12:08.778Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4792 | 2025-03-01T00:12:08.778Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4793 | 2025-03-01T00:12:08.782Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4794 | 2025-03-01T00:12:08.782Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4795 | 2025-03-01T00:12:08.782Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4796 | 2025-03-01T00:12:08.783Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4797 | 2025-03-01T00:12:08.796Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4798 | 2025-03-01T00:12:08.827Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4799 | 2025-03-01T00:12:08.827Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4800 | 2025-03-01T00:12:08.827Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4801 | 2025-03-01T00:12:08.827Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4802 | 2025-03-01T00:12:08.828Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4803 | 2025-03-01T00:12:08.828Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4804 | 2025-03-01T00:12:08.833Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4805 | 2025-03-01T00:12:08.833Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4806 | 2025-03-01T00:12:08.834Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4807 | 2025-03-01T00:12:08.834Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4808 | 2025-03-01T00:12:08.838Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4809 | 2025-03-01T00:12:08.838Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4810 | 2025-03-01T00:12:08.838Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4811 | 2025-03-01T00:12:08.839Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4812 | 2025-03-01T00:12:08.843Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4813 | 2025-03-01T00:12:08.851Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4814 | 2025-03-01T00:12:08.855Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4815 | 2025-03-01T00:12:08.855Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4816 | 2025-03-01T00:12:08.856Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = MarkAsStarting
|
4817 | 2025-03-01T00:12:08.882Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N004 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4818 | 2025-03-01T00:12:08.882Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]})
node_id = 4
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4819 | 2025-03-01T00:12:08.892Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4820 | 2025-03-01T00:12:08.892Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4821 | 2025-03-01T00:12:08.901Z | INFO | test_instance_serial (SagaExecutor): start saga: ensuring instance dpd configuration
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
start_reason = AutoStart
|
4822 | 2025-03-01T00:12:08.901Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4823 | 2025-03-01T00:12:08.901Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4824 | 2025-03-01T00:12:08.902Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4825 | 2025-03-01T00:12:08.909Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
4826 | 2025-03-01T00:12:08.910Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
4827 | 2025-03-01T00:12:08.910Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4828 | 2025-03-01T00:12:08.910Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4829 | 2025-03-01T00:12:08.910Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4830 | 2025-03-01T00:12:08.913Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
4831 | 2025-03-01T00:12:08.921Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
4832 | 2025-03-01T00:12:08.922Z | INFO | test_instance_serial (nexus): looking up instance's primary network interface
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
|
4833 | 2025-03-01T00:12:08.922Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4834 | 2025-03-01T00:12:08.922Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4835 | 2025-03-01T00:12:08.922Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4836 | 2025-03-01T00:12:08.926Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4837 | 2025-03-01T00:12:08.926Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4838 | 2025-03-01T00:12:08.926Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4839 | 2025-03-01T00:12:08.928Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4840 | 2025-03-01T00:12:08.928Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4841 | 2025-03-01T00:12:08.929Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4842 | 2025-03-01T00:12:08.931Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4843 | 2025-03-01T00:12:08.932Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4844 | 2025-03-01T00:12:08.932Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4845 | 2025-03-01T00:12:08.932Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4846 | 2025-03-01T00:12:08.933Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4847 | 2025-03-01T00:12:08.935Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4848 | 2025-03-01T00:12:08.937Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4849 | 2025-03-01T00:12:08.937Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4850 | 2025-03-01T00:12:08.937Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4851 | 2025-03-01T00:12:08.941Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4852 | 2025-03-01T00:12:08.941Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4853 | 2025-03-01T00:12:08.942Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4854 | 2025-03-01T00:12:08.942Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4855 | 2025-03-01T00:12:08.945Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4856 | 2025-03-01T00:12:08.956Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4857 | 2025-03-01T00:12:08.957Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4858 | 2025-03-01T00:12:08.957Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4859 | 2025-03-01T00:12:08.957Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4860 | 2025-03-01T00:12:08.957Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4861 | 2025-03-01T00:12:08.958Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4862 | 2025-03-01T00:12:08.964Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4863 | 2025-03-01T00:12:08.965Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4864 | 2025-03-01T00:12:08.965Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4865 | 2025-03-01T00:12:08.966Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4866 | 2025-03-01T00:12:08.969Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4867 | 2025-03-01T00:12:08.969Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4868 | 2025-03-01T00:12:08.969Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4869 | 2025-03-01T00:12:08.970Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4870 | 2025-03-01T00:12:08.972Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4871 | 2025-03-01T00:12:08.981Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4872 | 2025-03-01T00:12:08.981Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4873 | 2025-03-01T00:12:08.981Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4874 | 2025-03-01T00:12:08.981Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4875 | 2025-03-01T00:12:08.990Z | INFO | test_instance_serial (nexus): looking up instance's external IPs
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
|
4876 | 2025-03-01T00:12:08.990Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4877 | 2025-03-01T00:12:08.990Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4878 | 2025-03-01T00:12:08.990Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4879 | 2025-03-01T00:12:08.996Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4880 | 2025-03-01T00:12:08.996Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4881 | 2025-03-01T00:12:08.997Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = DpdEnsure
|
4882 | 2025-03-01T00:12:09.030Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
|
4883 | 2025-03-01T00:12:09.030Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
4884 | 2025-03-01T00:12:09.030Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4885 | 2025-03-01T00:12:09.030Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4886 | 2025-03-01T00:12:09.031Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4887 | 2025-03-01T00:12:09.032Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
4888 | 2025-03-01T00:12:09.035Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Fleet
result = Ok(())
|
4889 | 2025-03-01T00:12:09.036Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
4890 | 2025-03-01T00:12:09.036Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
4891 | 2025-03-01T00:12:09.036Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
4892 | 2025-03-01T00:12:09.039Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N005 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4893 | 2025-03-01T00:12:09.040Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 5
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4894 | 2025-03-01T00:12:09.046Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4895 | 2025-03-01T00:12:09.046Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4896 | 2025-03-01T00:12:09.054Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = v2p_manager
iteration = 2
reason = Signaled
|
4897 | 2025-03-01T00:12:09.054Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
4898 | 2025-03-01T00:12:09.054Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
4899 | 2025-03-01T00:12:09.055Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
4900 | 2025-03-01T00:12:09.055Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N006 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4901 | 2025-03-01T00:12:09.055Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 6
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4902 | 2025-03-01T00:12:09.065Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
4903 | 2025-03-01T00:12:09.065Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
4904 | 2025-03-01T00:12:09.086Z | INFO | test_instance_serial (SagaExecutor): start saga: ensuring instance is registered on sled
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
start_reason = AutoStart
|
4905 | 2025-03-01T00:12:09.086Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4906 | 2025-03-01T00:12:09.086Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4907 | 2025-03-01T00:12:09.086Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4908 | 2025-03-01T00:12:09.092Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4909 | 2025-03-01T00:12:09.092Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
4910 | 2025-03-01T00:12:09.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
4911 | 2025-03-01T00:12:09.092Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4912 | 2025-03-01T00:12:09.092Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4913 | 2025-03-01T00:12:09.092Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4914 | 2025-03-01T00:12:09.094Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
4915 | 2025-03-01T00:12:09.094Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
4916 | 2025-03-01T00:12:09.096Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4917 | 2025-03-01T00:12:09.096Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4918 | 2025-03-01T00:12:09.097Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4919 | 2025-03-01T00:12:09.098Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
4920 | 2025-03-01T00:12:09.098Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
4921 | 2025-03-01T00:12:09.099Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4922 | 2025-03-01T00:12:09.099Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4923 | 2025-03-01T00:12:09.099Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4924 | 2025-03-01T00:12:09.099Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4925 | 2025-03-01T00:12:09.101Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4926 | 2025-03-01T00:12:09.104Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4927 | 2025-03-01T00:12:09.104Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4928 | 2025-03-01T00:12:09.104Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4929 | 2025-03-01T00:12:09.108Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4930 | 2025-03-01T00:12:09.115Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4931 | 2025-03-01T00:12:09.116Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4932 | 2025-03-01T00:12:09.116Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4933 | 2025-03-01T00:12:09.117Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4934 | 2025-03-01T00:12:09.123Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4935 | 2025-03-01T00:12:09.131Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4936 | 2025-03-01T00:12:09.131Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4937 | 2025-03-01T00:12:09.131Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4938 | 2025-03-01T00:12:09.131Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4939 | 2025-03-01T00:12:09.131Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4940 | 2025-03-01T00:12:09.133Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4941 | 2025-03-01T00:12:09.135Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
4942 | 2025-03-01T00:12:09.135Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
4943 | 2025-03-01T00:12:09.136Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
4944 | 2025-03-01T00:12:09.137Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4945 | 2025-03-01T00:12:09.137Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4946 | 2025-03-01T00:12:09.137Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4947 | 2025-03-01T00:12:09.139Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4948 | 2025-03-01T00:12:09.142Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4949 | 2025-03-01T00:12:09.143Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4950 | 2025-03-01T00:12:09.143Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4951 | 2025-03-01T00:12:09.143Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4952 | 2025-03-01T00:12:09.147Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4953 | 2025-03-01T00:12:09.156Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4954 | 2025-03-01T00:12:09.156Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4955 | 2025-03-01T00:12:09.157Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4956 | 2025-03-01T00:12:09.157Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4957 | 2025-03-01T00:12:09.157Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4958 | 2025-03-01T00:12:09.157Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4959 | 2025-03-01T00:12:09.159Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4960 | 2025-03-01T00:12:09.161Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4961 | 2025-03-01T00:12:09.161Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4962 | 2025-03-01T00:12:09.161Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4963 | 2025-03-01T00:12:09.163Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4964 | 2025-03-01T00:12:09.163Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4965 | 2025-03-01T00:12:09.163Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4966 | 2025-03-01T00:12:09.163Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4967 | 2025-03-01T00:12:09.166Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4968 | 2025-03-01T00:12:09.175Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4969 | 2025-03-01T00:12:09.175Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4970 | 2025-03-01T00:12:09.175Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4971 | 2025-03-01T00:12:09.178Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4972 | 2025-03-01T00:12:09.180Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4973 | 2025-03-01T00:12:09.180Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4974 | 2025-03-01T00:12:09.181Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4975 | 2025-03-01T00:12:09.181Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4976 | 2025-03-01T00:12:09.181Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4977 | 2025-03-01T00:12:09.184Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4978 | 2025-03-01T00:12:09.184Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4979 | 2025-03-01T00:12:09.184Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4980 | 2025-03-01T00:12:09.184Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4981 | 2025-03-01T00:12:09.188Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4982 | 2025-03-01T00:12:09.188Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4983 | 2025-03-01T00:12:09.188Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4984 | 2025-03-01T00:12:09.188Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4985 | 2025-03-01T00:12:09.191Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4986 | 2025-03-01T00:12:09.207Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4987 | 2025-03-01T00:12:09.208Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4988 | 2025-03-01T00:12:09.208Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4989 | 2025-03-01T00:12:09.208Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4990 | 2025-03-01T00:12:09.219Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4991 | 2025-03-01T00:12:09.219Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4992 | 2025-03-01T00:12:09.220Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4993 | 2025-03-01T00:12:09.222Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4994 | 2025-03-01T00:12:09.222Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4995 | 2025-03-01T00:12:09.223Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4996 | 2025-03-01T00:12:09.226Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4997 | 2025-03-01T00:12:09.226Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4998 | 2025-03-01T00:12:09.227Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
4999 | 2025-03-01T00:12:09.228Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5000 | 2025-03-01T00:12:09.229Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5001 | 2025-03-01T00:12:09.229Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5002 | 2025-03-01T00:12:09.232Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5003 | 2025-03-01T00:12:09.232Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5004 | 2025-03-01T00:12:09.232Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5005 | 2025-03-01T00:12:09.234Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5006 | 2025-03-01T00:12:09.234Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5007 | 2025-03-01T00:12:09.234Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5008 | 2025-03-01T00:12:09.234Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5009 | 2025-03-01T00:12:09.235Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5010 | 2025-03-01T00:12:09.250Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5011 | 2025-03-01T00:12:09.250Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5012 | 2025-03-01T00:12:09.250Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5013 | 2025-03-01T00:12:09.252Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5014 | 2025-03-01T00:12:09.256Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5015 | 2025-03-01T00:12:09.256Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5016 | 2025-03-01T00:12:09.256Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5017 | 2025-03-01T00:12:09.257Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5018 | 2025-03-01T00:12:09.260Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5019 | 2025-03-01T00:12:09.271Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5020 | 2025-03-01T00:12:09.271Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5021 | 2025-03-01T00:12:09.271Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5022 | 2025-03-01T00:12:09.271Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5023 | 2025-03-01T00:12:09.271Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5024 | 2025-03-01T00:12:09.272Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5025 | 2025-03-01T00:12:09.272Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
5026 | 2025-03-01T00:12:09.273Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5027 | 2025-03-01T00:12:09.273Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5028 | 2025-03-01T00:12:09.273Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5029 | 2025-03-01T00:12:09.273Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5030 | 2025-03-01T00:12:09.276Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5031 | 2025-03-01T00:12:09.276Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5032 | 2025-03-01T00:12:09.277Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5033 | 2025-03-01T00:12:09.278Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5034 | 2025-03-01T00:12:09.281Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5035 | 2025-03-01T00:12:09.285Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
5036 | 2025-03-01T00:12:09.285Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
|
5037 | 2025-03-01T00:12:09.285Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5038 | 2025-03-01T00:12:09.285Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5039 | 2025-03-01T00:12:09.285Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5040 | 2025-03-01T00:12:09.285Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5041 | 2025-03-01T00:12:09.288Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5042 | 2025-03-01T00:12:09.288Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5043 | 2025-03-01T00:12:09.288Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5044 | 2025-03-01T00:12:09.288Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5045 | 2025-03-01T00:12:09.292Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5046 | 2025-03-01T00:12:09.296Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
5047 | 2025-03-01T00:12:09.296Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
|
5048 | 2025-03-01T00:12:09.296Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
5049 | 2025-03-01T00:12:09.297Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
5050 | 2025-03-01T00:12:09.298Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5051 | 2025-03-01T00:12:09.304Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5052 | 2025-03-01T00:12:09.306Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5053 | 2025-03-01T00:12:09.306Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5054 | 2025-03-01T00:12:09.306Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5055 | 2025-03-01T00:12:09.309Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5056 | 2025-03-01T00:12:09.309Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5057 | 2025-03-01T00:12:09.309Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5058 | 2025-03-01T00:12:09.349Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:38105/v2p
|
5059 | 2025-03-01T00:12:09.352Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50042
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5060 | 2025-03-01T00:12:09.355Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50042
req_id = 065c77aa-2f87-4b34-87ab-112c80725f9a
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5061 | 2025-03-01T00:12:09.355Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 173
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50042
req_id = 065c77aa-2f87-4b34-87ab-112c80725f9a
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5062 | 2025-03-01T00:12:09.355Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:38105/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "065c77aa-2f87-4b34-87ab-112c80725f9a", "content-length": "2", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5063 | 2025-03-01T00:12:09.357Z | INFO | test_instance_serial (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = sim-b6d65341
|
5064 | 2025-03-01T00:12:09.357Z | INFO | test_instance_serial (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = sim-b6d65341
|
5065 | 2025-03-01T00:12:09.357Z | INFO | test_instance_serial (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(10277605) }]
sled = sim-b6d65341
|
5066 | 2025-03-01T00:12:09.357Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = Some(Body)
method = PUT
uri = http://[::1]:38105/v2p
|
5067 | 2025-03-01T00:12:09.357Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50042
req_id = 768b5d71-b050-4bcb-a04e-417b4fc80ec3
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5068 | 2025-03-01T00:12:09.357Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 263
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50042
req_id = 768b5d71-b050-4bcb-a04e-417b4fc80ec3
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
5069 | 2025-03-01T00:12:09.357Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:38105/v2p", status: 204, headers: {"x-request-id": "768b5d71-b050-4bcb-a04e-417b4fc80ec3", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5070 | 2025-03-01T00:12:09.357Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 301.847234ms
iteration = 2
status = {}
|
5071 | 2025-03-01T00:12:09.357Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5072 | 2025-03-01T00:12:09.357Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5073 | 2025-03-01T00:12:09.357Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5074 | 2025-03-01T00:12:09.358Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5075 | 2025-03-01T00:12:09.360Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5076 | 2025-03-01T00:12:09.360Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5077 | 2025-03-01T00:12:09.360Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5078 | 2025-03-01T00:12:09.360Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5079 | 2025-03-01T00:12:09.360Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5080 | 2025-03-01T00:12:09.360Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5081 | 2025-03-01T00:12:09.361Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5082 | 2025-03-01T00:12:09.363Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5083 | 2025-03-01T00:12:09.364Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5084 | 2025-03-01T00:12:09.364Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5085 | 2025-03-01T00:12:09.364Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5086 | 2025-03-01T00:12:09.368Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5087 | 2025-03-01T00:12:09.368Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5088 | 2025-03-01T00:12:09.369Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5089 | 2025-03-01T00:12:09.369Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5090 | 2025-03-01T00:12:09.371Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5091 | 2025-03-01T00:12:09.380Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5092 | 2025-03-01T00:12:09.380Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5093 | 2025-03-01T00:12:09.380Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5094 | 2025-03-01T00:12:09.380Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5095 | 2025-03-01T00:12:09.380Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5096 | 2025-03-01T00:12:09.382Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5097 | 2025-03-01T00:12:09.389Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5098 | 2025-03-01T00:12:09.391Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5099 | 2025-03-01T00:12:09.391Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5100 | 2025-03-01T00:12:09.391Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5101 | 2025-03-01T00:12:09.396Z | TRAC | test_instance_serial (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5102 | 2025-03-01T00:12:09.396Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5103 | 2025-03-01T00:12:09.396Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5104 | 2025-03-01T00:12:09.396Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5105 | 2025-03-01T00:12:09.401Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5106 | 2025-03-01T00:12:09.409Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5107 | 2025-03-01T00:12:09.410Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5108 | 2025-03-01T00:12:09.410Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5109 | 2025-03-01T00:12:09.411Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5110 | 2025-03-01T00:12:09.416Z | DEBG | test_instance_serial (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {Name("default"): [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }]}
|
5111 | 2025-03-01T00:12:09.416Z | DEBG | test_instance_serial (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: Some([Vpc(Vni(10277605))]), filter_ports: None, filter_protocols: None, priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("22")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }]
|
5112 | 2025-03-01T00:12:09.417Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5113 | 2025-03-01T00:12:09.417Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5114 | 2025-03-01T00:12:09.418Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5115 | 2025-03-01T00:12:09.430Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5116 | 2025-03-01T00:12:09.430Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5117 | 2025-03-01T00:12:09.430Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5118 | 2025-03-01T00:12:09.432Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5119 | 2025-03-01T00:12:09.433Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5120 | 2025-03-01T00:12:09.433Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5121 | 2025-03-01T00:12:09.433Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5122 | 2025-03-01T00:12:09.433Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5123 | 2025-03-01T00:12:09.435Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5124 | 2025-03-01T00:12:09.441Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5125 | 2025-03-01T00:12:09.527Z | DEBG | test_instance_serial (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5126 | 2025-03-01T00:12:09.530Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50044
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5127 | 2025-03-01T00:12:09.531Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50044
req_id = 41b91d6d-4390-4805-bcff-650c602e0bbb
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5128 | 2025-03-01T00:12:09.531Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:36473
remote_addr = [::1]:49988
|
5129 | 2025-03-01T00:12:09.531Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:36473
method = PUT
remote_addr = [::1]:49988
req_id = 20b2d1b1-e1ba-43b4-ae71-c74c20ac27e2
uri = /instance
|
5130 | 2025-03-01T00:12:09.531Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 740
local_addr = [::1]:36473
method = PUT
remote_addr = [::1]:49988
req_id = 20b2d1b1-e1ba-43b4-ae71-c74c20ac27e2
response_code = 201
uri = /instance
|
5131 | 2025-03-01T00:12:09.531Z | INFO | test_instance_serial (SledAgent): created
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
initial_state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
kind = instances
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5132 | 2025-03-01T00:12:09.532Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 3535
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50044
req_id = 41b91d6d-4390-4805-bcff-650c602e0bbb
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5133 | 2025-03-01T00:12:09.532Z | DEBG | test_instance_serial (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 200, headers: {"content-type": "application/json", "x-request-id": "41b91d6d-4390-4805-bcff-650c602e0bbb", "content-length": "131", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5134 | 2025-03-01T00:12:09.535Z | INFO | test_instance_serial (SagaExecutor): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
|
5135 | 2025-03-01T00:12:09.535Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5136 | 2025-03-01T00:12:09.535Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5137 | 2025-03-01T00:12:09.536Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = EnsureRegistered
|
5138 | 2025-03-01T00:12:09.604Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N007 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5139 | 2025-03-01T00:12:09.604Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null})
node_id = 7
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5140 | 2025-03-01T00:12:09.616Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5141 | 2025-03-01T00:12:09.616Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5142 | 2025-03-01T00:12:09.628Z | TRAC | test_instance_serial (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AddVirtualResources
|
5143 | 2025-03-01T00:12:09.628Z | DEBG | test_instance_serial (SagaExecutor): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
roles = RoleSet { roles: {} }
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AddVirtualResources
|
5144 | 2025-03-01T00:12:09.630Z | DEBG | test_instance_serial (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
resource = Database
result = Ok(())
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_node = AddVirtualResources
|
5145 | 2025-03-01T00:12:09.685Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N008 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5146 | 2025-03-01T00:12:09.685Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 8
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5147 | 2025-03-01T00:12:09.693Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5148 | 2025-03-01T00:12:09.694Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5149 | 2025-03-01T00:12:09.701Z | INFO | test_instance_serial (SagaExecutor): start saga: ensuring instance is running
instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
start_reason = AutoStart
|
5150 | 2025-03-01T00:12:09.701Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5151 | 2025-03-01T00:12:09.702Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5152 | 2025-03-01T00:12:09.702Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5153 | 2025-03-01T00:12:09.704Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5154 | 2025-03-01T00:12:09.705Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5155 | 2025-03-01T00:12:09.705Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5156 | 2025-03-01T00:12:09.705Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5157 | 2025-03-01T00:12:09.706Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5158 | 2025-03-01T00:12:09.712Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5159 | 2025-03-01T00:12:09.716Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5160 | 2025-03-01T00:12:09.772Z | DEBG | test_instance_serial (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
5161 | 2025-03-01T00:12:09.775Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50046
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5162 | 2025-03-01T00:12:09.775Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5163 | 2025-03-01T00:12:09.779Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5164 | 2025-03-01T00:12:09.780Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50046
req_id = 8153f4ab-b22e-43aa-ab81-1af7f65d9b4b
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
5165 | 2025-03-01T00:12:09.783Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 3306
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50046
req_id = 8153f4ab-b22e-43aa-ab81-1af7f65d9b4b
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
5166 | 2025-03-01T00:12:09.789Z | DEBG | test_instance_serial (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "8153f4ab-b22e-43aa-ab81-1af7f65d9b4b", "content-length": "24", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5167 | 2025-03-01T00:12:09.790Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5168 | 2025-03-01T00:12:09.792Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5169 | 2025-03-01T00:12:09.792Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5170 | 2025-03-01T00:12:09.792Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5171 | 2025-03-01T00:12:09.792Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N009 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5172 | 2025-03-01T00:12:09.793Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 9
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5173 | 2025-03-01T00:12:09.804Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 started
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5174 | 2025-03-01T00:12:09.804Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5175 | 2025-03-01T00:12:09.817Z | DEBG | test_instance_serial (SEC): saga log event
new_state = N011 succeeded
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5176 | 2025-03-01T00:12:09.817Z | DEBG | test_instance_serial (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 11
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5177 | 2025-03-01T00:12:09.823Z | INFO | test_instance_serial (SEC): update for saga cached state
new_state = Done
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5178 | 2025-03-01T00:12:09.823Z | INFO | test_instance_serial (SecStore): updating state
new_state = done
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
|
5179 | 2025-03-01T00:12:09.839Z | INFO | test_instance_serial (SEC): saga finished
result = success
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5180 | 2025-03-01T00:12:09.841Z | INFO | test_instance_serial (SagaExecutor): saga finished
saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
saga_name = instance-start
saga_result = SagaResult { saga_id: 2501e814-0781-452f-ae67-33af9237ae1b, saga_log: SagaLog { saga_id: 2501e814-0781-452f-ae67-33af9237ae1b, unwinding: false, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N011 started, N011 succeeded], node_status: {0: Succeeded(String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a")), 1: Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")), 2: Succeeded(String("::1:0")), 3: Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}), 4: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"dpd_ensure": Null, "ensure_registered": Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}, "ensure_running": Null, "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "propolis_ip": String("::1:0"), "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "started_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "v2p_ensure": Null, "virtual_resources": Null, "vmm_record": Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}} }) }
|
5181 | 2025-03-01T00:12:09.842Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
uri = /v1/instances?project=springfield-squidport
|
5182 | 2025-03-01T00:12:09.842Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
5183 | 2025-03-01T00:12:09.842Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5184 | 2025-03-01T00:12:09.842Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5185 | 2025-03-01T00:12:09.842Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5186 | 2025-03-01T00:12:09.844Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
5187 | 2025-03-01T00:12:09.844Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5188 | 2025-03-01T00:12:09.844Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5189 | 2025-03-01T00:12:09.844Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5190 | 2025-03-01T00:12:09.850Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
5191 | 2025-03-01T00:12:09.850Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5192 | 2025-03-01T00:12:09.850Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5193 | 2025-03-01T00:12:09.850Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5194 | 2025-03-01T00:12:09.854Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
5195 | 2025-03-01T00:12:09.865Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5196 | 2025-03-01T00:12:09.865Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5197 | 2025-03-01T00:12:09.866Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5198 | 2025-03-01T00:12:09.866Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5199 | 2025-03-01T00:12:09.874Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5200 | 2025-03-01T00:12:09.875Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5201 | 2025-03-01T00:12:09.875Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5202 | 2025-03-01T00:12:09.875Z | DEBG | test_instance_serial (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 2
reason = Signaled
|
5203 | 2025-03-01T00:12:09.875Z | INFO | test_instance_serial (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
5204 | 2025-03-01T00:12:09.875Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
5205 | 2025-03-01T00:12:09.875Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5206 | 2025-03-01T00:12:09.875Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5207 | 2025-03-01T00:12:09.875Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5208 | 2025-03-01T00:12:09.876Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5209 | 2025-03-01T00:12:09.881Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5210 | 2025-03-01T00:12:09.881Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5211 | 2025-03-01T00:12:09.881Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5212 | 2025-03-01T00:12:09.885Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5213 | 2025-03-01T00:12:09.890Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
5214 | 2025-03-01T00:12:09.890Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
|
5215 | 2025-03-01T00:12:09.890Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5216 | 2025-03-01T00:12:09.890Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5217 | 2025-03-01T00:12:09.891Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5218 | 2025-03-01T00:12:09.891Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5219 | 2025-03-01T00:12:09.893Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5220 | 2025-03-01T00:12:09.893Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5221 | 2025-03-01T00:12:09.894Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5222 | 2025-03-01T00:12:09.898Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5223 | 2025-03-01T00:12:09.902Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
5224 | 2025-03-01T00:12:09.902Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5225 | 2025-03-01T00:12:09.902Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5226 | 2025-03-01T00:12:09.903Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5227 | 2025-03-01T00:12:09.905Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
uri = /v1/instances?project=springfield-squidport
|
5228 | 2025-03-01T00:12:09.905Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
5229 | 2025-03-01T00:12:09.905Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5230 | 2025-03-01T00:12:09.905Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5231 | 2025-03-01T00:12:09.906Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5232 | 2025-03-01T00:12:09.950Z | INFO | test_instance_serial (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
5233 | 2025-03-01T00:12:09.951Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:38105/vpc-routes
|
5234 | 2025-03-01T00:12:09.951Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50050
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5235 | 2025-03-01T00:12:09.952Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50050
req_id = c6546af1-422f-431e-b1b3-bb7804cd86d1
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5236 | 2025-03-01T00:12:09.952Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 376
local_addr = [::1]:38105
method = GET
remote_addr = [::1]:50050
req_id = c6546af1-422f-431e-b1b3-bb7804cd86d1
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5237 | 2025-03-01T00:12:09.953Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "c6546af1-422f-431e-b1b3-bb7804cd86d1", "content-length": "154", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5238 | 2025-03-01T00:12:09.953Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5239 | 2025-03-01T00:12:09.953Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5240 | 2025-03-01T00:12:09.955Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5241 | 2025-03-01T00:12:09.955Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
5242 | 2025-03-01T00:12:09.955Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5243 | 2025-03-01T00:12:09.955Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5244 | 2025-03-01T00:12:09.956Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5245 | 2025-03-01T00:12:09.974Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
5246 | 2025-03-01T00:12:09.976Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5247 | 2025-03-01T00:12:09.978Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5248 | 2025-03-01T00:12:09.979Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5249 | 2025-03-01T00:12:09.987Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
5250 | 2025-03-01T00:12:09.995Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5251 | 2025-03-01T00:12:09.996Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
uri = /v1/instances?project=springfield-squidport
|
5252 | 2025-03-01T00:12:09.996Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances?project=springfield-squidport
|
5253 | 2025-03-01T00:12:09.996Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5254 | 2025-03-01T00:12:09.996Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5255 | 2025-03-01T00:12:09.996Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5256 | 2025-03-01T00:12:10.006Z | INFO | test_instance_serial (BackgroundTasks): computed internet gateway mappings for sled
assocs = {056457f4-5d07-4fcc-acca-6b33df144cf3: {10.0.0.0: {0a0c9f59-6a31-43b0-969f-131b36ea3043}}}
background_task = vpc_route_manager
sled = sim-b6d65341
|
5257 | 2025-03-01T00:12:10.006Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:38105/eip-gateways
|
5258 | 2025-03-01T00:12:10.007Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances?project=springfield-squidport
|
5259 | 2025-03-01T00:12:10.007Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5260 | 2025-03-01T00:12:10.007Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5261 | 2025-03-01T00:12:10.008Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5262 | 2025-03-01T00:12:10.011Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50050
req_id = f050647c-b0c3-442b-810c-d7e306f5d362
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
5263 | 2025-03-01T00:12:10.013Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 343
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50050
req_id = f050647c-b0c3-442b-810c-d7e306f5d362
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
5264 | 2025-03-01T00:12:10.013Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances?project=springfield-squidport
|
5265 | 2025-03-01T00:12:10.013Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5266 | 2025-03-01T00:12:10.013Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5267 | 2025-03-01T00:12:10.013Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5268 | 2025-03-01T00:12:10.016Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:38105/eip-gateways", status: 204, headers: {"x-request-id": "f050647c-b0c3-442b-810c-d7e306f5d362", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
|
5269 | 2025-03-01T00:12:10.016Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5270 | 2025-03-01T00:12:10.016Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5271 | 2025-03-01T00:12:10.017Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5272 | 2025-03-01T00:12:10.017Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances?project=springfield-squidport
|
5273 | 2025-03-01T00:12:10.025Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5274 | 2025-03-01T00:12:10.025Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
uri = /v1/instances?project=springfield-squidport
|
5275 | 2025-03-01T00:12:10.025Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
roles = RoleSet { roles: {} }
uri = /v1/instances?project=springfield-squidport
|
5276 | 2025-03-01T00:12:10.026Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
resource = Database
result = Ok(())
uri = /v1/instances?project=springfield-squidport
|
5277 | 2025-03-01T00:12:10.030Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5278 | 2025-03-01T00:12:10.030Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5279 | 2025-03-01T00:12:10.030Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5280 | 2025-03-01T00:12:10.033Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 5431854
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa
response_code = 201
uri = /v1/instances?project=springfield-squidport
|
5281 | 2025-03-01T00:12:10.034Z | INFO | test_instance_serial (external client test context): client received response
status = 201
|
5282 | 2025-03-01T00:12:10.034Z | INFO | test_instance_serial (nexus): registering Oso class
class = Action
|
5283 | 2025-03-01T00:12:10.035Z | INFO | test_instance_serial (nexus): registering Oso class
class = AnyActor
|
5284 | 2025-03-01T00:12:10.035Z | INFO | test_instance_serial (nexus): registering Oso class
class = AuthenticatedActor
|
5285 | 2025-03-01T00:12:10.035Z | INFO | test_instance_serial (nexus): registering Oso class
class = BlueprintConfig
|
5286 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = Database
|
5287 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = DnsConfig
|
5288 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = Fleet
|
5289 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = Inventory
|
5290 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPoolList
|
5291 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSessionList
|
5292 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequestList
|
5293 | 2025-03-01T00:12:10.036Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloCertificateList
|
5294 | 2025-03-01T00:12:10.037Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloIdentityProviderList
|
5295 | 2025-03-01T00:12:10.037Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUserList
|
5296 | 2025-03-01T00:12:10.037Z | INFO | test_instance_serial (nexus): registering Oso class
class = Project
|
5297 | 2025-03-01T00:12:10.037Z | INFO | test_instance_serial (nexus): registering Oso class
class = Disk
|
5298 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Snapshot
|
5299 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = ProjectImage
|
5300 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Instance
|
5301 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPool
|
5302 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = InstanceNetworkInterface
|
5303 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Vpc
|
5304 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcRouter
|
5305 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGateway
|
5306 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpPool
|
5307 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpAddress
|
5308 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = RouterRoute
|
5309 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcSubnet
|
5310 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = FloatingIp
|
5311 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Image
|
5312 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloImage
|
5313 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = AddressLot
|
5314 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Blueprint
|
5315 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = LoopbackAddress
|
5316 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = Certificate
|
5317 | 2025-03-01T00:12:10.038Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSession
|
5318 | 2025-03-01T00:12:10.039Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequest
|
5319 | 2025-03-01T00:12:10.039Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAccessToken
|
5320 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = PhysicalDisk
|
5321 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = Rack
|
5322 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = RoleBuiltin
|
5323 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = SshKey
|
5324 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = Silo
|
5325 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUser
|
5326 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloGroup
|
5327 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = SupportBundle
|
5328 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = IdentityProvider
|
5329 | 2025-03-01T00:12:10.040Z | INFO | test_instance_serial (nexus): registering Oso class
class = SamlIdentityProvider
|
5330 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = Sled
|
5331 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufRepo
|
5332 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufArtifact
|
5333 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = Zpool
|
5334 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = Service
|
5335 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): registering Oso class
class = UserBuiltin
|
5336 | 2025-03-01T00:12:10.041Z | INFO | test_instance_serial (nexus): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
5337 | 2025-03-01T00:12:10.070Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5338 | 2025-03-01T00:12:10.070Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5339 | 2025-03-01T00:12:10.071Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5340 | 2025-03-01T00:12:10.075Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5341 | 2025-03-01T00:12:10.075Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5342 | 2025-03-01T00:12:10.076Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5343 | 2025-03-01T00:12:10.078Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5344 | 2025-03-01T00:12:10.079Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5345 | 2025-03-01T00:12:10.079Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5346 | 2025-03-01T00:12:10.081Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5347 | 2025-03-01T00:12:10.083Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5348 | 2025-03-01T00:12:10.083Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5349 | 2025-03-01T00:12:10.083Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5350 | 2025-03-01T00:12:10.083Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5351 | 2025-03-01T00:12:10.083Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5352 | 2025-03-01T00:12:10.085Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
5353 | 2025-03-01T00:12:10.085Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5354 | 2025-03-01T00:12:10.085Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5355 | 2025-03-01T00:12:10.085Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5356 | 2025-03-01T00:12:10.086Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5357 | 2025-03-01T00:12:10.086Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5358 | 2025-03-01T00:12:10.086Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5359 | 2025-03-01T00:12:10.088Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5360 | 2025-03-01T00:12:10.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5361 | 2025-03-01T00:12:10.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5362 | 2025-03-01T00:12:10.094Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5363 | 2025-03-01T00:12:10.095Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5364 | 2025-03-01T00:12:10.097Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5365 | 2025-03-01T00:12:10.097Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5366 | 2025-03-01T00:12:10.097Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5367 | 2025-03-01T00:12:10.097Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5368 | 2025-03-01T00:12:10.097Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5369 | 2025-03-01T00:12:10.099Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5370 | 2025-03-01T00:12:10.099Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5371 | 2025-03-01T00:12:10.100Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5372 | 2025-03-01T00:12:10.101Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5373 | 2025-03-01T00:12:10.101Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5374 | 2025-03-01T00:12:10.102Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5375 | 2025-03-01T00:12:10.102Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5376 | 2025-03-01T00:12:10.103Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5377 | 2025-03-01T00:12:10.103Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5378 | 2025-03-01T00:12:10.105Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5379 | 2025-03-01T00:12:10.106Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5380 | 2025-03-01T00:12:10.108Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5381 | 2025-03-01T00:12:10.108Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
|
5382 | 2025-03-01T00:12:10.108Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5383 | 2025-03-01T00:12:10.108Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5384 | 2025-03-01T00:12:10.108Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5385 | 2025-03-01T00:12:10.109Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5386 | 2025-03-01T00:12:10.111Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5387 | 2025-03-01T00:12:10.112Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5388 | 2025-03-01T00:12:10.112Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5389 | 2025-03-01T00:12:10.112Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5390 | 2025-03-01T00:12:10.112Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
5391 | 2025-03-01T00:12:10.121Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
5392 | 2025-03-01T00:12:10.121Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
5393 | 2025-03-01T00:12:10.121Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5394 | 2025-03-01T00:12:10.121Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5395 | 2025-03-01T00:12:10.121Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5396 | 2025-03-01T00:12:10.121Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5397 | 2025-03-01T00:12:10.123Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5398 | 2025-03-01T00:12:10.123Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5399 | 2025-03-01T00:12:10.123Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5400 | 2025-03-01T00:12:10.123Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5401 | 2025-03-01T00:12:10.125Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5402 | 2025-03-01T00:12:10.125Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5403 | 2025-03-01T00:12:10.126Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5404 | 2025-03-01T00:12:10.128Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5405 | 2025-03-01T00:12:10.128Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5406 | 2025-03-01T00:12:10.138Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
result = Ok(())
|
5407 | 2025-03-01T00:12:10.138Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user
background_task = vpc_route_manager
|
5408 | 2025-03-01T00:12:10.138Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
|
5409 | 2025-03-01T00:12:10.138Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5410 | 2025-03-01T00:12:10.138Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5411 | 2025-03-01T00:12:10.138Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5412 | 2025-03-01T00:12:10.139Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5413 | 2025-03-01T00:12:10.142Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5414 | 2025-03-01T00:12:10.142Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5415 | 2025-03-01T00:12:10.142Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5416 | 2025-03-01T00:12:10.143Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5417 | 2025-03-01T00:12:10.144Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5418 | 2025-03-01T00:12:10.144Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5419 | 2025-03-01T00:12:10.145Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5420 | 2025-03-01T00:12:10.146Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5421 | 2025-03-01T00:12:10.148Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
5422 | 2025-03-01T00:12:10.158Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
5423 | 2025-03-01T00:12:10.159Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5424 | 2025-03-01T00:12:10.159Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5425 | 2025-03-01T00:12:10.159Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5426 | 2025-03-01T00:12:10.160Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5427 | 2025-03-01T00:12:10.161Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5428 | 2025-03-01T00:12:10.161Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5429 | 2025-03-01T00:12:10.161Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5430 | 2025-03-01T00:12:10.162Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5431 | 2025-03-01T00:12:10.172Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
result = Ok(())
|
5432 | 2025-03-01T00:12:10.172Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5433 | 2025-03-01T00:12:10.173Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5434 | 2025-03-01T00:12:10.173Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5435 | 2025-03-01T00:12:10.174Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5436 | 2025-03-01T00:12:10.174Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5437 | 2025-03-01T00:12:10.174Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5438 | 2025-03-01T00:12:10.197Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5439 | 2025-03-01T00:12:10.207Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5440 | 2025-03-01T00:12:10.207Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5441 | 2025-03-01T00:12:10.207Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5442 | 2025-03-01T00:12:10.207Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5443 | 2025-03-01T00:12:10.207Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5444 | 2025-03-01T00:12:10.208Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5445 | 2025-03-01T00:12:10.208Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5446 | 2025-03-01T00:12:10.208Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5447 | 2025-03-01T00:12:10.212Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5448 | 2025-03-01T00:12:10.256Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5449 | 2025-03-01T00:12:10.257Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5450 | 2025-03-01T00:12:10.257Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5451 | 2025-03-01T00:12:10.258Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50052
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5452 | 2025-03-01T00:12:10.258Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50052
req_id = 894039ef-3da1-4e6d-8b98-e812ac060d2d
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
5453 | 2025-03-01T00:12:10.258Z | INFO | test_instance_serial (SledAgent): simulated transition finish
action = None
desired_after = None
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
kind = instances
requested_state = None
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
|
5454 | 2025-03-01T00:12:10.259Z | DEBG | test_instance_serial (NexusClient): client request
body = Some(Body)
method = PUT
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5455 | 2025-03-01T00:12:10.260Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5456 | 2025-03-01T00:12:10.260Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5457 | 2025-03-01T00:12:10.260Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5458 | 2025-03-01T00:12:10.262Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5459 | 2025-03-01T00:12:10.263Z | INFO | test_instance_serial (dropshot_internal): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
|
5460 | 2025-03-01T00:12:10.263Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
resource = Database
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5461 | 2025-03-01T00:12:10.264Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
roles = RoleSet { roles: {} }
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5462 | 2025-03-01T00:12:10.264Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
resource = Database
result = Ok(())
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5463 | 2025-03-01T00:12:10.265Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5464 | 2025-03-01T00:12:10.265Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5465 | 2025-03-01T00:12:10.266Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5466 | 2025-03-01T00:12:10.269Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
|
5467 | 2025-03-01T00:12:10.269Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5468 | 2025-03-01T00:12:10.269Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5469 | 2025-03-01T00:12:10.269Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5470 | 2025-03-01T00:12:10.270Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5471 | 2025-03-01T00:12:10.271Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 11281
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = b973846d-65c5-4f61-83b5-bb485845129e
response_code = 204
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5472 | 2025-03-01T00:12:10.272Z | DEBG | test_instance_serial (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "b973846d-65c5-4f61-83b5-bb485845129e", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5473 | 2025-03-01T00:12:10.272Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 13271
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50052
req_id = 894039ef-3da1-4e6d-8b98-e812ac060d2d
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
5474 | 2025-03-01T00:12:10.272Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5475 | 2025-03-01T00:12:10.272Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5476 | 2025-03-01T00:12:10.272Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5477 | 2025-03-01T00:12:10.272Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5478 | 2025-03-01T00:12:10.274Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
|
5479 | 2025-03-01T00:12:10.275Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5480 | 2025-03-01T00:12:10.276Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5481 | 2025-03-01T00:12:10.276Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5482 | 2025-03-01T00:12:10.276Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5483 | 2025-03-01T00:12:10.276Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5484 | 2025-03-01T00:12:10.276Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5485 | 2025-03-01T00:12:10.276Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5486 | 2025-03-01T00:12:10.276Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5487 | 2025-03-01T00:12:10.276Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5488 | 2025-03-01T00:12:10.276Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5489 | 2025-03-01T00:12:10.278Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5490 | 2025-03-01T00:12:10.278Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5491 | 2025-03-01T00:12:10.278Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5492 | 2025-03-01T00:12:10.280Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5493 | 2025-03-01T00:12:10.302Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
result = Ok(())
|
5494 | 2025-03-01T00:12:10.302Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = vpc_route_manager
|
5495 | 2025-03-01T00:12:10.302Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5496 | 2025-03-01T00:12:10.302Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5497 | 2025-03-01T00:12:10.304Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5498 | 2025-03-01T00:12:10.305Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
5499 | 2025-03-01T00:12:10.305Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5500 | 2025-03-01T00:12:10.305Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5501 | 2025-03-01T00:12:10.305Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5502 | 2025-03-01T00:12:10.306Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5503 | 2025-03-01T00:12:10.306Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5504 | 2025-03-01T00:12:10.306Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5505 | 2025-03-01T00:12:10.306Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5506 | 2025-03-01T00:12:10.308Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5507 | 2025-03-01T00:12:10.308Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5508 | 2025-03-01T00:12:10.308Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5509 | 2025-03-01T00:12:10.309Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5510 | 2025-03-01T00:12:10.310Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5511 | 2025-03-01T00:12:10.310Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5512 | 2025-03-01T00:12:10.311Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5513 | 2025-03-01T00:12:10.312Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5514 | 2025-03-01T00:12:10.315Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
5515 | 2025-03-01T00:12:10.315Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5516 | 2025-03-01T00:12:10.315Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5517 | 2025-03-01T00:12:10.315Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5518 | 2025-03-01T00:12:10.316Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5519 | 2025-03-01T00:12:10.316Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5520 | 2025-03-01T00:12:10.317Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5521 | 2025-03-01T00:12:10.318Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
5522 | 2025-03-01T00:12:10.318Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5523 | 2025-03-01T00:12:10.320Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5524 | 2025-03-01T00:12:10.320Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5525 | 2025-03-01T00:12:10.320Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5526 | 2025-03-01T00:12:10.321Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5527 | 2025-03-01T00:12:10.321Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5528 | 2025-03-01T00:12:10.324Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5529 | 2025-03-01T00:12:10.324Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5530 | 2025-03-01T00:12:10.324Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ByName("default") }
|
5531 | 2025-03-01T00:12:10.324Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5532 | 2025-03-01T00:12:10.324Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5533 | 2025-03-01T00:12:10.324Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5534 | 2025-03-01T00:12:10.324Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5535 | 2025-03-01T00:12:10.326Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5536 | 2025-03-01T00:12:10.329Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
5537 | 2025-03-01T00:12:10.330Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5538 | 2025-03-01T00:12:10.331Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5539 | 2025-03-01T00:12:10.331Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5540 | 2025-03-01T00:12:10.331Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5541 | 2025-03-01T00:12:10.331Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5542 | 2025-03-01T00:12:10.331Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5543 | 2025-03-01T00:12:10.331Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5544 | 2025-03-01T00:12:10.331Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5545 | 2025-03-01T00:12:10.333Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5546 | 2025-03-01T00:12:10.335Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5547 | 2025-03-01T00:12:10.335Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5548 | 2025-03-01T00:12:10.336Z | TRAC | test_instance_serial (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5549 | 2025-03-01T00:12:10.336Z | TRAC | test_instance_serial (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
|
5550 | 2025-03-01T00:12:10.336Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
5551 | 2025-03-01T00:12:10.336Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
5552 | 2025-03-01T00:12:10.336Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5553 | 2025-03-01T00:12:10.337Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5554 | 2025-03-01T00:12:10.338Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5555 | 2025-03-01T00:12:10.338Z | DEBG | test_instance_serial (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
5556 | 2025-03-01T00:12:10.365Z | DEBG | test_instance_serial (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
background_task = vpc_route_manager
resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ByName("default") }
result = Ok(())
|
5557 | 2025-03-01T00:12:10.367Z | TRAC | test_instance_serial (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user
background_task = vpc_route_manager
|
5558 | 2025-03-01T00:12:10.367Z | DEBG | test_instance_serial (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vpc-routes
|
5559 | 2025-03-01T00:12:10.367Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50050
req_id = f8d9c9a0-d471-4133-bf13-0835ff30c2f7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5560 | 2025-03-01T00:12:10.368Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 2144
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50050
req_id = f8d9c9a0-d471-4133-bf13-0835ff30c2f7
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
5561 | 2025-03-01T00:12:10.368Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5562 | 2025-03-01T00:12:10.368Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5563 | 2025-03-01T00:12:10.369Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5564 | 2025-03-01T00:12:10.369Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5565 | 2025-03-01T00:12:10.369Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5566 | 2025-03-01T00:12:10.370Z | DEBG | test_instance_serial (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 204, headers: {"x-request-id": "f8d9c9a0-d471-4133-bf13-0835ff30c2f7", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
|
5567 | 2025-03-01T00:12:10.371Z | DEBG | test_instance_serial (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 495.828392ms
iteration = 2
status = {}
|
5568 | 2025-03-01T00:12:10.373Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5569 | 2025-03-01T00:12:10.374Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5570 | 2025-03-01T00:12:10.374Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5571 | 2025-03-01T00:12:10.374Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5572 | 2025-03-01T00:12:10.383Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5573 | 2025-03-01T00:12:10.385Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5574 | 2025-03-01T00:12:10.385Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5575 | 2025-03-01T00:12:10.385Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5576 | 2025-03-01T00:12:10.390Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5577 | 2025-03-01T00:12:10.401Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5578 | 2025-03-01T00:12:10.402Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5579 | 2025-03-01T00:12:10.402Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5580 | 2025-03-01T00:12:10.402Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5581 | 2025-03-01T00:12:10.402Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5582 | 2025-03-01T00:12:10.402Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5583 | 2025-03-01T00:12:10.405Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5584 | 2025-03-01T00:12:10.406Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5585 | 2025-03-01T00:12:10.406Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5586 | 2025-03-01T00:12:10.407Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5587 | 2025-03-01T00:12:10.408Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5588 | 2025-03-01T00:12:10.409Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5589 | 2025-03-01T00:12:10.409Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5590 | 2025-03-01T00:12:10.409Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5591 | 2025-03-01T00:12:10.412Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5592 | 2025-03-01T00:12:10.423Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5593 | 2025-03-01T00:12:10.424Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5594 | 2025-03-01T00:12:10.424Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5595 | 2025-03-01T00:12:10.425Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5596 | 2025-03-01T00:12:10.434Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 159117
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855
response_code = 200
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5597 | 2025-03-01T00:12:10.435Z | INFO | test_instance_serial (external client test context): client received response
status = 200
|
5598 | 2025-03-01T00:12:10.645Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
5599 | 2025-03-01T00:12:10.646Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5600 | 2025-03-01T00:12:10.646Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5601 | 2025-03-01T00:12:10.646Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5602 | 2025-03-01T00:12:10.647Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5603 | 2025-03-01T00:12:10.648Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5604 | 2025-03-01T00:12:10.652Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3710
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5605 | 2025-03-01T00:12:10.653Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "856f4bb4-27b8-4b39-8483-6ba13539bb07", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
|
5606 | 2025-03-01T00:12:10.653Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5607 | 2025-03-01T00:12:10.653Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5608 | 2025-03-01T00:12:10.653Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5609 | 2025-03-01T00:12:10.653Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5610 | 2025-03-01T00:12:10.653Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5611 | 2025-03-01T00:12:10.654Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3464
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5612 | 2025-03-01T00:12:10.655Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d7ac525a-6aec-4af5-92e6-4ea1518677df", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
|
5613 | 2025-03-01T00:12:10.656Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5614 | 2025-03-01T00:12:10.656Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5615 | 2025-03-01T00:12:10.656Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
5616 | 2025-03-01T00:12:10.722Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5617 | 2025-03-01T00:12:10.722Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5618 | 2025-03-01T00:12:10.735Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5619 | 2025-03-01T00:12:10.736Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5620 | 2025-03-01T00:12:10.736Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5621 | 2025-03-01T00:12:10.736Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5622 | 2025-03-01T00:12:11.091Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5623 | 2025-03-01T00:12:11.092Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5624 | 2025-03-01T00:12:11.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5625 | 2025-03-01T00:12:11.096Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5626 | 2025-03-01T00:12:11.097Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5627 | 2025-03-01T00:12:11.100Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5628 | 2025-03-01T00:12:11.100Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5629 | 2025-03-01T00:12:11.722Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5630 | 2025-03-01T00:12:11.722Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5631 | 2025-03-01T00:12:11.727Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5632 | 2025-03-01T00:12:11.729Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5633 | 2025-03-01T00:12:11.729Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5634 | 2025-03-01T00:12:11.729Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5635 | 2025-03-01T00:12:12.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5636 | 2025-03-01T00:12:12.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5637 | 2025-03-01T00:12:12.090Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5638 | 2025-03-01T00:12:12.095Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5639 | 2025-03-01T00:12:12.096Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5640 | 2025-03-01T00:12:12.098Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5641 | 2025-03-01T00:12:12.098Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5642 | 2025-03-01T00:12:12.646Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
5643 | 2025-03-01T00:12:12.646Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5644 | 2025-03-01T00:12:12.646Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5645 | 2025-03-01T00:12:12.647Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5646 | 2025-03-01T00:12:12.649Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5647 | 2025-03-01T00:12:12.649Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5648 | 2025-03-01T00:12:12.651Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 4865
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5649 | 2025-03-01T00:12:12.652Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b4059b0b-f229-4be1-bdbf-71b0e46d27a6", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:11 GMT"} })
|
5650 | 2025-03-01T00:12:12.652Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5651 | 2025-03-01T00:12:12.652Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5652 | 2025-03-01T00:12:12.653Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5653 | 2025-03-01T00:12:12.654Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5654 | 2025-03-01T00:12:12.654Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5655 | 2025-03-01T00:12:12.657Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3744
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5656 | 2025-03-01T00:12:12.658Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "fa160899-a5e3-46f8-9972-d4bc477ddb8e", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:11 GMT"} })
|
5657 | 2025-03-01T00:12:12.658Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5658 | 2025-03-01T00:12:12.658Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5659 | 2025-03-01T00:12:12.658Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
5660 | 2025-03-01T00:12:12.724Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5661 | 2025-03-01T00:12:12.732Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5662 | 2025-03-01T00:12:12.754Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5663 | 2025-03-01T00:12:12.755Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5664 | 2025-03-01T00:12:12.755Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5665 | 2025-03-01T00:12:12.755Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5666 | 2025-03-01T00:12:13.089Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5667 | 2025-03-01T00:12:13.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5668 | 2025-03-01T00:12:13.090Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5669 | 2025-03-01T00:12:13.095Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5670 | 2025-03-01T00:12:13.096Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5671 | 2025-03-01T00:12:13.100Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5672 | 2025-03-01T00:12:13.101Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5673 | 2025-03-01T00:12:13.725Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5674 | 2025-03-01T00:12:13.727Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5675 | 2025-03-01T00:12:13.731Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5676 | 2025-03-01T00:12:13.732Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5677 | 2025-03-01T00:12:13.732Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5678 | 2025-03-01T00:12:13.732Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5679 | 2025-03-01T00:12:14.089Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5680 | 2025-03-01T00:12:14.089Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5681 | 2025-03-01T00:12:14.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5682 | 2025-03-01T00:12:14.093Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5683 | 2025-03-01T00:12:14.093Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5684 | 2025-03-01T00:12:14.096Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5685 | 2025-03-01T00:12:14.096Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5686 | 2025-03-01T00:12:14.645Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
5687 | 2025-03-01T00:12:14.646Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5688 | 2025-03-01T00:12:14.646Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5689 | 2025-03-01T00:12:14.647Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5690 | 2025-03-01T00:12:14.647Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5691 | 2025-03-01T00:12:14.647Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5692 | 2025-03-01T00:12:14.649Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 2970
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5693 | 2025-03-01T00:12:14.650Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "348de9cf-549e-4dfa-aa57-2ab257cd5af0", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} })
|
5694 | 2025-03-01T00:12:14.650Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5695 | 2025-03-01T00:12:14.650Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5696 | 2025-03-01T00:12:14.650Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5697 | 2025-03-01T00:12:14.650Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5698 | 2025-03-01T00:12:14.651Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5699 | 2025-03-01T00:12:14.652Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 2546
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5700 | 2025-03-01T00:12:14.653Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4b5ecba-c464-47a7-93da-a56cefa5f0a3", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} })
|
5701 | 2025-03-01T00:12:14.654Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5702 | 2025-03-01T00:12:14.654Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5703 | 2025-03-01T00:12:14.654Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
5704 | 2025-03-01T00:12:14.665Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5705 | 2025-03-01T00:12:14.666Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5706 | 2025-03-01T00:12:14.666Z | INFO | test_instance_serial (dropshot): accepted connection
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:1025
local_addr = 127.0.0.1:43677
remote_addr = 127.0.0.1:52896
|
5707 | 2025-03-01T00:12:14.666Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = 127.0.0.1:43677
method = GET
remote_addr = 127.0.0.1:52896
req_id = c2b0fdb9-2ae6-43f4-afb0-2ab129c29c89
uri = /07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5708 | 2025-03-01T00:12:14.679Z | INFO | test_instance_serial (dropshot): request completed
file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:867
latency_us = 13688
local_addr = 127.0.0.1:43677
method = GET
remote_addr = 127.0.0.1:52896
req_id = c2b0fdb9-2ae6-43f4-afb0-2ab129c29c89
response_code = 200
uri = /07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5709 | 2025-03-01T00:12:14.684Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5710 | 2025-03-01T00:12:14.706Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 5
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5711 | 2025-03-01T00:12:14.707Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5712 | 2025-03-01T00:12:14.707Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5713 | 2025-03-01T00:12:14.707Z | DEBG | test_instance_serial (results-sink): inserting 34 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5714 | 2025-03-01T00:12:14.708Z | DEBG | test_instance_serial (clickhouse-client): unrolling 34 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5715 | 2025-03-01T00:12:14.708Z | DEBG | test_instance_serial (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5716 | 2025-03-01T00:12:14.708Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('integration_target:integration_metric') FORMAT Native;
|
5717 | 2025-03-01T00:12:14.717Z | TRAC | test_instance_serial (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5718 | 2025-03-01T00:12:14.718Z | DEBG | test_instance_serial (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.708004380Z }
timeseries_name = http_service:request_latency_histogram
|
5719 | 2025-03-01T00:12:14.726Z | DEBG | test_instance_serial (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5720 | 2025-03-01T00:12:14.727Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
|
5721 | 2025-03-01T00:12:14.727Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5722 | 2025-03-01T00:12:14.730Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5723 | 2025-03-01T00:12:14.732Z | TRAC | test_instance_serial (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5724 | 2025-03-01T00:12:14.732Z | DEBG | test_instance_serial (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.726831692Z }
timeseries_name = collection_target:cpus_provisioned
|
5725 | 2025-03-01T00:12:14.733Z | DEBG | test_instance_serial (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5726 | 2025-03-01T00:12:14.733Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
|
5727 | 2025-03-01T00:12:14.739Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5728 | 2025-03-01T00:12:14.740Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5729 | 2025-03-01T00:12:14.745Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5730 | 2025-03-01T00:12:14.745Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5731 | 2025-03-01T00:12:14.745Z | TRAC | test_instance_serial (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5732 | 2025-03-01T00:12:14.745Z | DEBG | test_instance_serial (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.732988702Z }
timeseries_name = collection_target:ram_provisioned
|
5733 | 2025-03-01T00:12:14.745Z | DEBG | test_instance_serial (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5734 | 2025-03-01T00:12:14.745Z | TRAC | test_instance_serial (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
|
5735 | 2025-03-01T00:12:14.747Z | TRAC | test_instance_serial (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5736 | 2025-03-01T00:12:14.747Z | DEBG | test_instance_serial (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.741970587Z }
timeseries_name = collection_target:virtual_disk_space_provisioned
|
5737 | 2025-03-01T00:12:14.759Z | DEBG | test_instance_serial (clickhouse-client): inserting 4 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5738 | 2025-03-01T00:12:14.765Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 6
n_rows = 4
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
5739 | 2025-03-01T00:12:14.770Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 26
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5740 | 2025-03-01T00:12:14.773Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 26
table_name = fields_string
|
5741 | 2025-03-01T00:12:14.773Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 13
sql = INSERT INTO oximeter.fields_u16 FORMAT Native
|
5742 | 2025-03-01T00:12:14.778Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 13
table_name = fields_u16
|
5743 | 2025-03-01T00:12:14.779Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 28
sql = INSERT INTO oximeter.fields_uuid FORMAT Native
|
5744 | 2025-03-01T00:12:14.790Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 28
table_name = fields_uuid
|
5745 | 2025-03-01T00:12:14.791Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 19
n_rows = 13
sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
|
5746 | 2025-03-01T00:12:14.802Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 13
table_name = measurements_histogramu64
|
5747 | 2025-03-01T00:12:14.802Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 21
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5748 | 2025-03-01T00:12:14.809Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 21
table_name = measurements_i64
|
5749 | 2025-03-01T00:12:14.809Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5750 | 2025-03-01T00:12:15.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5751 | 2025-03-01T00:12:15.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5752 | 2025-03-01T00:12:15.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5753 | 2025-03-01T00:12:15.094Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5754 | 2025-03-01T00:12:15.094Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5755 | 2025-03-01T00:12:15.097Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5756 | 2025-03-01T00:12:15.097Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5757 | 2025-03-01T00:12:15.440Z | INFO | test_instance_serial (nexus): registering Oso class
class = Action
|
5758 | 2025-03-01T00:12:15.440Z | INFO | test_instance_serial (nexus): registering Oso class
class = AnyActor
|
5759 | 2025-03-01T00:12:15.440Z | INFO | test_instance_serial (nexus): registering Oso class
class = AuthenticatedActor
|
5760 | 2025-03-01T00:12:15.440Z | INFO | test_instance_serial (nexus): registering Oso class
class = BlueprintConfig
|
5761 | 2025-03-01T00:12:15.440Z | INFO | test_instance_serial (nexus): registering Oso class
class = Database
|
5762 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = DnsConfig
|
5763 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Fleet
|
5764 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Inventory
|
5765 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPoolList
|
5766 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSessionList
|
5767 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequestList
|
5768 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloCertificateList
|
5769 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloIdentityProviderList
|
5770 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUserList
|
5771 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Project
|
5772 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Disk
|
5773 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Snapshot
|
5774 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = ProjectImage
|
5775 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Instance
|
5776 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPool
|
5777 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = InstanceNetworkInterface
|
5778 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = Vpc
|
5779 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcRouter
|
5780 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGateway
|
5781 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpPool
|
5782 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpAddress
|
5783 | 2025-03-01T00:12:15.441Z | INFO | test_instance_serial (nexus): registering Oso class
class = RouterRoute
|
5784 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcSubnet
|
5785 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = FloatingIp
|
5786 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = Image
|
5787 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloImage
|
5788 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = AddressLot
|
5789 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = Blueprint
|
5790 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = LoopbackAddress
|
5791 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = Certificate
|
5792 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSession
|
5793 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequest
|
5794 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAccessToken
|
5795 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = PhysicalDisk
|
5796 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = Rack
|
5797 | 2025-03-01T00:12:15.442Z | INFO | test_instance_serial (nexus): registering Oso class
class = RoleBuiltin
|
5798 | 2025-03-01T00:12:15.443Z | INFO | test_instance_serial (nexus): registering Oso class
class = SshKey
|
5799 | 2025-03-01T00:12:15.443Z | INFO | test_instance_serial (nexus): registering Oso class
class = Silo
|
5800 | 2025-03-01T00:12:15.443Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUser
|
5801 | 2025-03-01T00:12:15.443Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloGroup
|
5802 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = SupportBundle
|
5803 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = IdentityProvider
|
5804 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = SamlIdentityProvider
|
5805 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = Sled
|
5806 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufRepo
|
5807 | 2025-03-01T00:12:15.444Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufArtifact
|
5808 | 2025-03-01T00:12:15.445Z | INFO | test_instance_serial (nexus): registering Oso class
class = Zpool
|
5809 | 2025-03-01T00:12:15.445Z | INFO | test_instance_serial (nexus): registering Oso class
class = Service
|
5810 | 2025-03-01T00:12:15.445Z | INFO | test_instance_serial (nexus): registering Oso class
class = UserBuiltin
|
5811 | 2025-03-01T00:12:15.445Z | INFO | test_instance_serial (nexus): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
5812 | 2025-03-01T00:12:15.462Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5813 | 2025-03-01T00:12:15.463Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5814 | 2025-03-01T00:12:15.463Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5815 | 2025-03-01T00:12:15.469Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5816 | 2025-03-01T00:12:15.470Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5817 | 2025-03-01T00:12:15.470Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5818 | 2025-03-01T00:12:15.474Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5819 | 2025-03-01T00:12:15.474Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5820 | 2025-03-01T00:12:15.475Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5821 | 2025-03-01T00:12:15.477Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
5822 | 2025-03-01T00:12:15.477Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5823 | 2025-03-01T00:12:15.477Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5824 | 2025-03-01T00:12:15.477Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5825 | 2025-03-01T00:12:15.478Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5826 | 2025-03-01T00:12:15.482Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5827 | 2025-03-01T00:12:15.482Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5828 | 2025-03-01T00:12:15.482Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5829 | 2025-03-01T00:12:15.483Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5830 | 2025-03-01T00:12:15.485Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5831 | 2025-03-01T00:12:15.485Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5832 | 2025-03-01T00:12:15.485Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5833 | 2025-03-01T00:12:15.486Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5834 | 2025-03-01T00:12:15.489Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
5835 | 2025-03-01T00:12:15.497Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
5836 | 2025-03-01T00:12:15.497Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
5837 | 2025-03-01T00:12:15.497Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
5838 | 2025-03-01T00:12:15.497Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5839 | 2025-03-01T00:12:15.497Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5840 | 2025-03-01T00:12:15.498Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5841 | 2025-03-01T00:12:15.500Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5842 | 2025-03-01T00:12:15.501Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5843 | 2025-03-01T00:12:15.501Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5844 | 2025-03-01T00:12:15.501Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5845 | 2025-03-01T00:12:15.504Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5846 | 2025-03-01T00:12:15.505Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5847 | 2025-03-01T00:12:15.505Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5848 | 2025-03-01T00:12:15.505Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5849 | 2025-03-01T00:12:15.508Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
5850 | 2025-03-01T00:12:15.515Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
5851 | 2025-03-01T00:12:15.515Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
5852 | 2025-03-01T00:12:15.515Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
5853 | 2025-03-01T00:12:15.515Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
5854 | 2025-03-01T00:12:15.519Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5855 | 2025-03-01T00:12:15.519Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5856 | 2025-03-01T00:12:15.519Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5857 | 2025-03-01T00:12:15.522Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
5858 | 2025-03-01T00:12:15.522Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5859 | 2025-03-01T00:12:15.522Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
5860 | 2025-03-01T00:12:15.522Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
5861 | 2025-03-01T00:12:15.523Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
5862 | 2025-03-01T00:12:15.525Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
5863 | 2025-03-01T00:12:15.529Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
5864 | 2025-03-01T00:12:15.564Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50054
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5865 | 2025-03-01T00:12:15.565Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50054
req_id = 9faed7b8-9952-4bde-8e9a-4281aa357794
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
5866 | 2025-03-01T00:12:15.565Z | INFO | test_instance_serial (SledAgent): simulated transition finish
action = None
desired_after = None
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
kind = instances
requested_state = None
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
|
5867 | 2025-03-01T00:12:15.565Z | DEBG | test_instance_serial (NexusClient): client request
body = Some(Body)
method = PUT
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5868 | 2025-03-01T00:12:15.565Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5869 | 2025-03-01T00:12:15.565Z | INFO | test_instance_serial (dropshot_internal): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
|
5870 | 2025-03-01T00:12:15.566Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
resource = Database
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5871 | 2025-03-01T00:12:15.566Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
roles = RoleSet { roles: {} }
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5872 | 2025-03-01T00:12:15.567Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
resource = Database
result = Ok(())
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5873 | 2025-03-01T00:12:15.572Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 6863
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = 742019e5-770f-43f7-8651-b4be40804d1d
response_code = 204
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
5874 | 2025-03-01T00:12:15.573Z | DEBG | test_instance_serial (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "742019e5-770f-43f7-8651-b4be40804d1d", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
5875 | 2025-03-01T00:12:15.573Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 7951
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50054
req_id = 9faed7b8-9952-4bde-8e9a-4281aa357794
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
5876 | 2025-03-01T00:12:15.574Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
|
5877 | 2025-03-01T00:12:15.574Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5878 | 2025-03-01T00:12:15.575Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5879 | 2025-03-01T00:12:15.575Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5880 | 2025-03-01T00:12:15.575Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5881 | 2025-03-01T00:12:15.575Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5882 | 2025-03-01T00:12:15.576Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5883 | 2025-03-01T00:12:15.578Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5884 | 2025-03-01T00:12:15.578Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5885 | 2025-03-01T00:12:15.578Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5886 | 2025-03-01T00:12:15.580Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
5887 | 2025-03-01T00:12:15.580Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5888 | 2025-03-01T00:12:15.580Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5889 | 2025-03-01T00:12:15.580Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5890 | 2025-03-01T00:12:15.581Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5891 | 2025-03-01T00:12:15.582Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5892 | 2025-03-01T00:12:15.582Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5893 | 2025-03-01T00:12:15.582Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5894 | 2025-03-01T00:12:15.583Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5895 | 2025-03-01T00:12:15.584Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5896 | 2025-03-01T00:12:15.587Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
5897 | 2025-03-01T00:12:15.590Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5898 | 2025-03-01T00:12:15.590Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5899 | 2025-03-01T00:12:15.590Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5900 | 2025-03-01T00:12:15.590Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
5901 | 2025-03-01T00:12:15.590Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
5902 | 2025-03-01T00:12:15.590Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5903 | 2025-03-01T00:12:15.590Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5904 | 2025-03-01T00:12:15.590Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5905 | 2025-03-01T00:12:15.592Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
5906 | 2025-03-01T00:12:15.592Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
5907 | 2025-03-01T00:12:15.592Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
5908 | 2025-03-01T00:12:15.592Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
5909 | 2025-03-01T00:12:15.594Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
5910 | 2025-03-01T00:12:15.598Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
5911 | 2025-03-01T00:12:15.599Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5912 | 2025-03-01T00:12:15.599Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5913 | 2025-03-01T00:12:15.599Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5914 | 2025-03-01T00:12:15.599Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5915 | 2025-03-01T00:12:15.601Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5916 | 2025-03-01T00:12:15.604Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5917 | 2025-03-01T00:12:15.604Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5918 | 2025-03-01T00:12:15.604Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5919 | 2025-03-01T00:12:15.604Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5920 | 2025-03-01T00:12:15.605Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5921 | 2025-03-01T00:12:15.608Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5922 | 2025-03-01T00:12:15.608Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5923 | 2025-03-01T00:12:15.608Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5924 | 2025-03-01T00:12:15.608Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5925 | 2025-03-01T00:12:15.608Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5926 | 2025-03-01T00:12:15.612Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5927 | 2025-03-01T00:12:15.614Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5928 | 2025-03-01T00:12:15.614Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5929 | 2025-03-01T00:12:15.614Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5930 | 2025-03-01T00:12:15.615Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5931 | 2025-03-01T00:12:15.615Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5932 | 2025-03-01T00:12:15.615Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5933 | 2025-03-01T00:12:15.616Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5934 | 2025-03-01T00:12:15.618Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5935 | 2025-03-01T00:12:15.623Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5936 | 2025-03-01T00:12:15.623Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5937 | 2025-03-01T00:12:15.624Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5938 | 2025-03-01T00:12:15.624Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5939 | 2025-03-01T00:12:15.624Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5940 | 2025-03-01T00:12:15.624Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5941 | 2025-03-01T00:12:15.626Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5942 | 2025-03-01T00:12:15.629Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5943 | 2025-03-01T00:12:15.629Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5944 | 2025-03-01T00:12:15.629Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5945 | 2025-03-01T00:12:15.629Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5946 | 2025-03-01T00:12:15.629Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5947 | 2025-03-01T00:12:15.629Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5948 | 2025-03-01T00:12:15.629Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5949 | 2025-03-01T00:12:15.631Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5950 | 2025-03-01T00:12:15.636Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5951 | 2025-03-01T00:12:15.639Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5952 | 2025-03-01T00:12:15.639Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5953 | 2025-03-01T00:12:15.639Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5954 | 2025-03-01T00:12:15.639Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 64559
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5
response_code = 200
uri = /v1/instances/kris-picks?project=springfield-squidport
|
5955 | 2025-03-01T00:12:15.639Z | INFO | test_instance_serial (external client test context): client received response
status = 200
|
5956 | 2025-03-01T00:12:15.736Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5957 | 2025-03-01T00:12:15.736Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5958 | 2025-03-01T00:12:15.749Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5959 | 2025-03-01T00:12:15.763Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5960 | 2025-03-01T00:12:15.764Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5961 | 2025-03-01T00:12:15.764Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5962 | 2025-03-01T00:12:16.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5963 | 2025-03-01T00:12:16.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5964 | 2025-03-01T00:12:16.090Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5965 | 2025-03-01T00:12:16.095Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5966 | 2025-03-01T00:12:16.095Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5967 | 2025-03-01T00:12:16.102Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5968 | 2025-03-01T00:12:16.102Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5969 | 2025-03-01T00:12:16.647Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
5970 | 2025-03-01T00:12:16.647Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5971 | 2025-03-01T00:12:16.647Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 95eb70ce-e15a-4428-9cce-862aaed02425
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5972 | 2025-03-01T00:12:16.647Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 95eb70ce-e15a-4428-9cce-862aaed02425
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5973 | 2025-03-01T00:12:16.647Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 95eb70ce-e15a-4428-9cce-862aaed02425
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5974 | 2025-03-01T00:12:16.647Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 95eb70ce-e15a-4428-9cce-862aaed02425
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5975 | 2025-03-01T00:12:16.652Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3767
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 95eb70ce-e15a-4428-9cce-862aaed02425
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
5976 | 2025-03-01T00:12:16.652Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "95eb70ce-e15a-4428-9cce-862aaed02425", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:15 GMT"} })
|
5977 | 2025-03-01T00:12:16.652Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5978 | 2025-03-01T00:12:16.652Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5979 | 2025-03-01T00:12:16.652Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5980 | 2025-03-01T00:12:16.652Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5981 | 2025-03-01T00:12:16.652Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5982 | 2025-03-01T00:12:16.654Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3436
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
5983 | 2025-03-01T00:12:16.655Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e98c12ee-3286-42a7-b011-2a18bb7264f0", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:15 GMT"} })
|
5984 | 2025-03-01T00:12:16.655Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
5985 | 2025-03-01T00:12:16.655Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5986 | 2025-03-01T00:12:16.655Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
5987 | 2025-03-01T00:12:16.723Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5988 | 2025-03-01T00:12:16.738Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5989 | 2025-03-01T00:12:16.738Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5990 | 2025-03-01T00:12:16.738Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5991 | 2025-03-01T00:12:16.739Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5992 | 2025-03-01T00:12:16.739Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
5993 | 2025-03-01T00:12:17.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
5994 | 2025-03-01T00:12:17.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
5995 | 2025-03-01T00:12:17.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
5996 | 2025-03-01T00:12:17.095Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
5997 | 2025-03-01T00:12:17.096Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
5998 | 2025-03-01T00:12:17.101Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
5999 | 2025-03-01T00:12:17.101Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6000 | 2025-03-01T00:12:17.727Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6001 | 2025-03-01T00:12:17.727Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6002 | 2025-03-01T00:12:17.733Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6003 | 2025-03-01T00:12:17.736Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6004 | 2025-03-01T00:12:17.736Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6005 | 2025-03-01T00:12:17.736Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6006 | 2025-03-01T00:12:18.091Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6007 | 2025-03-01T00:12:18.092Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
6008 | 2025-03-01T00:12:18.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
6009 | 2025-03-01T00:12:18.094Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
6010 | 2025-03-01T00:12:18.095Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
6011 | 2025-03-01T00:12:18.099Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
6012 | 2025-03-01T00:12:18.099Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6013 | 2025-03-01T00:12:18.647Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
6014 | 2025-03-01T00:12:18.648Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6015 | 2025-03-01T00:12:18.648Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6016 | 2025-03-01T00:12:18.648Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6017 | 2025-03-01T00:12:18.648Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6018 | 2025-03-01T00:12:18.648Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6019 | 2025-03-01T00:12:18.650Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3461
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6020 | 2025-03-01T00:12:18.652Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "210fd997-7e1e-40b8-8c9f-34994c67796f", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:17 GMT"} })
|
6021 | 2025-03-01T00:12:18.653Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6022 | 2025-03-01T00:12:18.653Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6023 | 2025-03-01T00:12:18.653Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6024 | 2025-03-01T00:12:18.653Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6025 | 2025-03-01T00:12:18.653Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6026 | 2025-03-01T00:12:18.670Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 19142
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6027 | 2025-03-01T00:12:18.671Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "01ea3f21-caab-4b73-ab17-10270b3ee0fd", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:17 GMT"} })
|
6028 | 2025-03-01T00:12:18.672Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
6029 | 2025-03-01T00:12:18.672Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6030 | 2025-03-01T00:12:18.672Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
6031 | 2025-03-01T00:12:18.722Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6032 | 2025-03-01T00:12:18.737Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6033 | 2025-03-01T00:12:18.771Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6034 | 2025-03-01T00:12:18.772Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6035 | 2025-03-01T00:12:18.773Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6036 | 2025-03-01T00:12:18.773Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6037 | 2025-03-01T00:12:19.089Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6038 | 2025-03-01T00:12:19.090Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
6039 | 2025-03-01T00:12:19.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
6040 | 2025-03-01T00:12:19.096Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
6041 | 2025-03-01T00:12:19.097Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
6042 | 2025-03-01T00:12:19.100Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
6043 | 2025-03-01T00:12:19.100Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6044 | 2025-03-01T00:12:19.731Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6045 | 2025-03-01T00:12:19.732Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6046 | 2025-03-01T00:12:19.745Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6047 | 2025-03-01T00:12:19.746Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6048 | 2025-03-01T00:12:19.746Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6049 | 2025-03-01T00:12:19.746Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6050 | 2025-03-01T00:12:19.784Z | INFO | test_instance_serial (SledAgent): noop transition
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
kind = instances
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
target = Running
|
6051 | 2025-03-01T00:12:19.785Z | INFO | test_instance_serial (SledAgent-insure_instance_state): sim_ensure success
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
vmm_state = SledVmmState {\n migration_in: None,\n migration_out: None,\n vmm_state: VmmRuntimeState {\n gen: Generation(\n 2,\n ),\n state: Starting,\n time_updated: 2025-03-01T00:12:09.526791825Z,\n },\n}
|
6052 | 2025-03-01T00:12:20.091Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6053 | 2025-03-01T00:12:20.092Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
6054 | 2025-03-01T00:12:20.092Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
6055 | 2025-03-01T00:12:20.098Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
6056 | 2025-03-01T00:12:20.099Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
6057 | 2025-03-01T00:12:20.103Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
6058 | 2025-03-01T00:12:20.103Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6059 | 2025-03-01T00:12:20.641Z | INFO | test_instance_serial (nexus): registering Oso class
class = Action
|
6060 | 2025-03-01T00:12:20.642Z | INFO | test_instance_serial (nexus): registering Oso class
class = AnyActor
|
6061 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = AuthenticatedActor
|
6062 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = BlueprintConfig
|
6063 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = Database
|
6064 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = DnsConfig
|
6065 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = Fleet
|
6066 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = Inventory
|
6067 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPoolList
|
6068 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSessionList
|
6069 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequestList
|
6070 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloCertificateList
|
6071 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloIdentityProviderList
|
6072 | 2025-03-01T00:12:20.643Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUserList
|
6073 | 2025-03-01T00:12:20.648Z | INFO | test_instance_serial (nexus): registering Oso class
class = Project
|
6074 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = Disk
|
6075 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = Snapshot
|
6076 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = ProjectImage
|
6077 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = Instance
|
6078 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = IpPool
|
6079 | 2025-03-01T00:12:20.650Z | INFO | test_instance_serial (nexus): registering Oso class
class = InstanceNetworkInterface
|
6080 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = Vpc
|
6081 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcRouter
|
6082 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGateway
|
6083 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpPool
|
6084 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = InternetGatewayIpAddress
|
6085 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = RouterRoute
|
6086 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = VpcSubnet
|
6087 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = FloatingIp
|
6088 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = Image
|
6089 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloImage
|
6090 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = AddressLot
|
6091 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = Blueprint
|
6092 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = LoopbackAddress
|
6093 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = Certificate
|
6094 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = ConsoleSession
|
6095 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAuthRequest
|
6096 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = DeviceAccessToken
|
6097 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = PhysicalDisk
|
6098 | 2025-03-01T00:12:20.651Z | INFO | test_instance_serial (nexus): registering Oso class
class = Rack
|
6099 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = RoleBuiltin
|
6100 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = SshKey
|
6101 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = Silo
|
6102 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloUser
|
6103 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = SiloGroup
|
6104 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = SupportBundle
|
6105 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = IdentityProvider
|
6106 | 2025-03-01T00:12:20.652Z | INFO | test_instance_serial (nexus): registering Oso class
class = SamlIdentityProvider
|
6107 | 2025-03-01T00:12:20.653Z | INFO | test_instance_serial (nexus): registering Oso class
class = Sled
|
6108 | 2025-03-01T00:12:20.653Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufRepo
|
6109 | 2025-03-01T00:12:20.653Z | INFO | test_instance_serial (nexus): registering Oso class
class = TufArtifact
|
6110 | 2025-03-01T00:12:20.653Z | INFO | test_instance_serial (nexus): registering Oso class
class = Zpool
|
6111 | 2025-03-01T00:12:20.654Z | INFO | test_instance_serial (nexus): registering Oso class
class = Service
|
6112 | 2025-03-01T00:12:20.654Z | INFO | test_instance_serial (nexus): registering Oso class
class = UserBuiltin
|
6113 | 2025-03-01T00:12:20.654Z | INFO | test_instance_serial (nexus): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
6114 | 2025-03-01T00:12:20.660Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6115 | 2025-03-01T00:12:20.660Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6116 | 2025-03-01T00:12:20.661Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6117 | 2025-03-01T00:12:20.661Z | INFO | test_instance_serial (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:474
|
6118 | 2025-03-01T00:12:20.662Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6119 | 2025-03-01T00:12:20.662Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6120 | 2025-03-01T00:12:20.662Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6121 | 2025-03-01T00:12:20.662Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6122 | 2025-03-01T00:12:20.663Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6123 | 2025-03-01T00:12:20.663Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6124 | 2025-03-01T00:12:20.663Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6125 | 2025-03-01T00:12:20.664Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6126 | 2025-03-01T00:12:20.666Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 3972
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
6127 | 2025-03-01T00:12:20.666Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6128 | 2025-03-01T00:12:20.667Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6129 | 2025-03-01T00:12:20.667Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6130 | 2025-03-01T00:12:20.667Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:19 GMT"} })
|
6131 | 2025-03-01T00:12:20.667Z | DEBG | test_instance_serial (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6132 | 2025-03-01T00:12:20.668Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6133 | 2025-03-01T00:12:20.669Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac
resource = Database
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6134 | 2025-03-01T00:12:20.669Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac
roles = RoleSet { roles: {} }
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6135 | 2025-03-01T00:12:20.670Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac
resource = Database
result = Ok(())
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6136 | 2025-03-01T00:12:20.671Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
6137 | 2025-03-01T00:12:20.671Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
6138 | 2025-03-01T00:12:20.672Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6139 | 2025-03-01T00:12:20.672Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6140 | 2025-03-01T00:12:20.672Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6141 | 2025-03-01T00:12:20.675Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 6691
local_addr = 127.0.0.1:41715
method = GET
remote_addr = 127.0.0.1:42654
req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
6142 | 2025-03-01T00:12:20.675Z | DEBG | test_instance_serial (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e89e0cb6-f787-4053-ad9e-25e33e51e3ac", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:19 GMT"} })
|
6143 | 2025-03-01T00:12:20.675Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
|
6144 | 2025-03-01T00:12:20.675Z | TRAC | test_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6145 | 2025-03-01T00:12:20.675Z | INFO | test_instance_serial (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:549
n_current_tasks = 2
n_pruned_tasks = 0
|
6146 | 2025-03-01T00:12:20.677Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6147 | 2025-03-01T00:12:20.677Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6148 | 2025-03-01T00:12:20.677Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6149 | 2025-03-01T00:12:20.678Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6150 | 2025-03-01T00:12:20.680Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6151 | 2025-03-01T00:12:20.681Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6152 | 2025-03-01T00:12:20.681Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6153 | 2025-03-01T00:12:20.681Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6154 | 2025-03-01T00:12:20.683Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
6155 | 2025-03-01T00:12:20.691Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
6156 | 2025-03-01T00:12:20.691Z | TRAC | test_instance_serial (nexus): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
6157 | 2025-03-01T00:12:20.691Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
6158 | 2025-03-01T00:12:20.691Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6159 | 2025-03-01T00:12:20.691Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6160 | 2025-03-01T00:12:20.692Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6161 | 2025-03-01T00:12:20.701Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6162 | 2025-03-01T00:12:20.701Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6163 | 2025-03-01T00:12:20.702Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6164 | 2025-03-01T00:12:20.702Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6165 | 2025-03-01T00:12:20.705Z | TRAC | test_instance_serial (nexus): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6166 | 2025-03-01T00:12:20.706Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6167 | 2025-03-01T00:12:20.706Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6168 | 2025-03-01T00:12:20.706Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6169 | 2025-03-01T00:12:20.709Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
6170 | 2025-03-01T00:12:20.716Z | DEBG | test_instance_serial (nexus): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
6171 | 2025-03-01T00:12:20.716Z | TRAC | test_instance_serial (nexus): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6172 | 2025-03-01T00:12:20.716Z | DEBG | test_instance_serial (nexus): roles
roles = RoleSet { roles: {} }
|
6173 | 2025-03-01T00:12:20.716Z | DEBG | test_instance_serial (nexus): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6174 | 2025-03-01T00:12:20.721Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
6175 | 2025-03-01T00:12:20.721Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
6176 | 2025-03-01T00:12:20.722Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
6177 | 2025-03-01T00:12:20.723Z | DEBG | test_instance_serial (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6178 | 2025-03-01T00:12:20.723Z | DEBG | test_instance_serial (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6179 | 2025-03-01T00:12:20.728Z | TRAC | test_instance_serial (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6180 | 2025-03-01T00:12:20.728Z | DEBG | test_instance_serial (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6181 | 2025-03-01T00:12:20.728Z | TRAC | test_instance_serial (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6182 | 2025-03-01T00:12:20.728Z | TRAC | test_instance_serial (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
6183 | 2025-03-01T00:12:20.731Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
6184 | 2025-03-01T00:12:20.731Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6185 | 2025-03-01T00:12:20.732Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
6186 | 2025-03-01T00:12:20.732Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
6187 | 2025-03-01T00:12:20.732Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
6188 | 2025-03-01T00:12:20.742Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
6189 | 2025-03-01T00:12:20.746Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
6190 | 2025-03-01T00:12:20.786Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50056
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
6191 | 2025-03-01T00:12:20.788Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50056
req_id = a4b4810d-3bc8-42f4-a3b8-3b1bf90786bc
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
6192 | 2025-03-01T00:12:20.789Z | INFO | test_instance_serial (SledAgent): simulated transition finish
action = None
desired_after = None
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
kind = instances
requested_state = Some(Running)
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Running, gen: Generation(3), time_updated: 2025-03-01T00:12:20.789619453Z }, migration_in: None, migration_out: None }
state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
|
6193 | 2025-03-01T00:12:20.789Z | DEBG | test_instance_serial (NexusClient): client request
body = Some(Body)
method = PUT
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6194 | 2025-03-01T00:12:20.790Z | TRAC | test_instance_serial (dropshot_internal): incoming request
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6195 | 2025-03-01T00:12:20.791Z | INFO | test_instance_serial (dropshot_internal): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
vmm_state = VmmRuntimeState { state: Running, gen: Generation(3), time_updated: 2025-03-01T00:12:20.789619453Z }
|
6196 | 2025-03-01T00:12:20.791Z | TRAC | test_instance_serial (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
resource = Database
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6197 | 2025-03-01T00:12:20.791Z | DEBG | test_instance_serial (dropshot_internal): roles
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
roles = RoleSet { roles: {} }
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6198 | 2025-03-01T00:12:20.792Z | DEBG | test_instance_serial (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. })
actor_id = 001de000-05e4-4000-8000-000000000002
authenticated = true
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
resource = Database
result = Ok(())
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6199 | 2025-03-01T00:12:20.827Z | INFO | test_instance_serial (dropshot_internal): request completed
latency_us = 37073
local_addr = 127.0.0.1:41715
method = PUT
remote_addr = 127.0.0.1:42630
req_id = baf7a501-33df-42c7-9246-081a2ebf76bd
response_code = 204
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
|
6200 | 2025-03-01T00:12:20.828Z | DEBG | test_instance_serial (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "baf7a501-33df-42c7-9246-081a2ebf76bd", "date": "Sat, 01 Mar 2025 00:12:20 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
6201 | 2025-03-01T00:12:20.830Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 39914
local_addr = [::1]:38105
method = POST
remote_addr = [::1]:50056
req_id = a4b4810d-3bc8-42f4-a3b8-3b1bf90786bc
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
|
6202 | 2025-03-01T00:12:20.830Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
|
6203 | 2025-03-01T00:12:20.830Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6204 | 2025-03-01T00:12:20.830Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6205 | 2025-03-01T00:12:20.830Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6206 | 2025-03-01T00:12:20.831Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6207 | 2025-03-01T00:12:20.831Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6208 | 2025-03-01T00:12:20.831Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6209 | 2025-03-01T00:12:20.833Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6210 | 2025-03-01T00:12:20.834Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6211 | 2025-03-01T00:12:20.834Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6212 | 2025-03-01T00:12:20.835Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
6213 | 2025-03-01T00:12:20.836Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6214 | 2025-03-01T00:12:20.838Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6215 | 2025-03-01T00:12:20.838Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6216 | 2025-03-01T00:12:20.838Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6217 | 2025-03-01T00:12:20.838Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6218 | 2025-03-01T00:12:20.839Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6219 | 2025-03-01T00:12:20.839Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6220 | 2025-03-01T00:12:20.839Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6221 | 2025-03-01T00:12:20.840Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6222 | 2025-03-01T00:12:20.843Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
6223 | 2025-03-01T00:12:20.844Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6224 | 2025-03-01T00:12:20.844Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6225 | 2025-03-01T00:12:20.844Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6226 | 2025-03-01T00:12:20.845Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
6227 | 2025-03-01T00:12:20.846Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6228 | 2025-03-01T00:12:20.846Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6229 | 2025-03-01T00:12:20.846Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6230 | 2025-03-01T00:12:20.846Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6231 | 2025-03-01T00:12:20.848Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6232 | 2025-03-01T00:12:20.848Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6233 | 2025-03-01T00:12:20.848Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6234 | 2025-03-01T00:12:20.848Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6235 | 2025-03-01T00:12:20.850Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6236 | 2025-03-01T00:12:20.853Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
6237 | 2025-03-01T00:12:20.853Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6238 | 2025-03-01T00:12:20.853Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6239 | 2025-03-01T00:12:20.853Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6240 | 2025-03-01T00:12:20.853Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6241 | 2025-03-01T00:12:20.855Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6242 | 2025-03-01T00:12:20.855Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6243 | 2025-03-01T00:12:20.856Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6244 | 2025-03-01T00:12:20.857Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6245 | 2025-03-01T00:12:20.857Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6246 | 2025-03-01T00:12:20.858Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6247 | 2025-03-01T00:12:20.860Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6248 | 2025-03-01T00:12:20.861Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6249 | 2025-03-01T00:12:20.861Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6250 | 2025-03-01T00:12:20.861Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6251 | 2025-03-01T00:12:20.861Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6252 | 2025-03-01T00:12:20.864Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6253 | 2025-03-01T00:12:20.864Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6254 | 2025-03-01T00:12:20.864Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6255 | 2025-03-01T00:12:20.864Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6256 | 2025-03-01T00:12:20.866Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6257 | 2025-03-01T00:12:20.867Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6258 | 2025-03-01T00:12:20.868Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6259 | 2025-03-01T00:12:20.868Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6260 | 2025-03-01T00:12:20.872Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6261 | 2025-03-01T00:12:20.883Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6262 | 2025-03-01T00:12:20.883Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6263 | 2025-03-01T00:12:20.883Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6264 | 2025-03-01T00:12:20.883Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6265 | 2025-03-01T00:12:20.883Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6266 | 2025-03-01T00:12:20.884Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6267 | 2025-03-01T00:12:20.889Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6268 | 2025-03-01T00:12:20.889Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6269 | 2025-03-01T00:12:20.889Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6270 | 2025-03-01T00:12:20.889Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6271 | 2025-03-01T00:12:20.893Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6272 | 2025-03-01T00:12:20.893Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6273 | 2025-03-01T00:12:20.893Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6274 | 2025-03-01T00:12:20.894Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6275 | 2025-03-01T00:12:20.898Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6276 | 2025-03-01T00:12:20.906Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6277 | 2025-03-01T00:12:20.906Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6278 | 2025-03-01T00:12:20.906Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6279 | 2025-03-01T00:12:20.908Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6280 | 2025-03-01T00:12:20.910Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 80393
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae
response_code = 200
uri = /v1/instances/kris-picks?project=springfield-squidport
|
6281 | 2025-03-01T00:12:20.911Z | INFO | test_instance_serial (external client test context): client received response
status = 200
|
6282 | 2025-03-01T00:12:20.911Z | INFO | test_instance_serial: registering Oso class
class = Action
|
6283 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = AnyActor
|
6284 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = AuthenticatedActor
|
6285 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = BlueprintConfig
|
6286 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = Database
|
6287 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = DnsConfig
|
6288 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = Fleet
|
6289 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = Inventory
|
6290 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = IpPoolList
|
6291 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = ConsoleSessionList
|
6292 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = DeviceAuthRequestList
|
6293 | 2025-03-01T00:12:20.916Z | INFO | test_instance_serial: registering Oso class
class = SiloCertificateList
|
6294 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = SiloIdentityProviderList
|
6295 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = SiloUserList
|
6296 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Project
|
6297 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Disk
|
6298 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Snapshot
|
6299 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = ProjectImage
|
6300 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Instance
|
6301 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = IpPool
|
6302 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = InstanceNetworkInterface
|
6303 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Vpc
|
6304 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = VpcRouter
|
6305 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = InternetGateway
|
6306 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = InternetGatewayIpPool
|
6307 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = InternetGatewayIpAddress
|
6308 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = RouterRoute
|
6309 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = VpcSubnet
|
6310 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = FloatingIp
|
6311 | 2025-03-01T00:12:20.917Z | INFO | test_instance_serial: registering Oso class
class = Image
|
6312 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SiloImage
|
6313 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = AddressLot
|
6314 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Blueprint
|
6315 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = LoopbackAddress
|
6316 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Certificate
|
6317 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = ConsoleSession
|
6318 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = DeviceAuthRequest
|
6319 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = DeviceAccessToken
|
6320 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = PhysicalDisk
|
6321 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Rack
|
6322 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = RoleBuiltin
|
6323 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SshKey
|
6324 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Silo
|
6325 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SiloUser
|
6326 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SiloGroup
|
6327 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SupportBundle
|
6328 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = IdentityProvider
|
6329 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = SamlIdentityProvider
|
6330 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Sled
|
6331 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = TufRepo
|
6332 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = TufArtifact
|
6333 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Zpool
|
6334 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = Service
|
6335 | 2025-03-01T00:12:20.918Z | INFO | test_instance_serial: registering Oso class
class = UserBuiltin
|
6336 | 2025-03-01T00:12:20.919Z | INFO | test_instance_serial: full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
|
6337 | 2025-03-01T00:12:20.928Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6338 | 2025-03-01T00:12:20.928Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6339 | 2025-03-01T00:12:20.929Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6340 | 2025-03-01T00:12:20.931Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6341 | 2025-03-01T00:12:20.931Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6342 | 2025-03-01T00:12:20.932Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6343 | 2025-03-01T00:12:20.934Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6344 | 2025-03-01T00:12:20.934Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6345 | 2025-03-01T00:12:20.934Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6346 | 2025-03-01T00:12:20.935Z | TRAC | test_instance_serial: authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
|
6347 | 2025-03-01T00:12:20.936Z | TRAC | test_instance_serial: loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
|
6348 | 2025-03-01T00:12:20.936Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6349 | 2025-03-01T00:12:20.936Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6350 | 2025-03-01T00:12:20.936Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6351 | 2025-03-01T00:12:20.938Z | TRAC | test_instance_serial: loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6352 | 2025-03-01T00:12:20.939Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6353 | 2025-03-01T00:12:20.939Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6354 | 2025-03-01T00:12:20.939Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6355 | 2025-03-01T00:12:20.941Z | TRAC | test_instance_serial: loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6356 | 2025-03-01T00:12:20.941Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6357 | 2025-03-01T00:12:20.941Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6358 | 2025-03-01T00:12:20.942Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6359 | 2025-03-01T00:12:20.950Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
|
6360 | 2025-03-01T00:12:20.958Z | DEBG | test_instance_serial: authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
result = Ok(())
|
6361 | 2025-03-01T00:12:20.959Z | TRAC | test_instance_serial: authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
|
6362 | 2025-03-01T00:12:20.959Z | DEBG | test_instance_serial: roles
roles = RoleSet { roles: {} }
|
6363 | 2025-03-01T00:12:20.959Z | DEBG | test_instance_serial: authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
resource = Database
result = Ok(())
|
6364 | 2025-03-01T00:12:20.985Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6365 | 2025-03-01T00:12:20.985Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6366 | 2025-03-01T00:12:20.986Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6367 | 2025-03-01T00:12:20.986Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6368 | 2025-03-01T00:12:20.987Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6369 | 2025-03-01T00:12:20.987Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6370 | 2025-03-01T00:12:20.987Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6371 | 2025-03-01T00:12:20.991Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6372 | 2025-03-01T00:12:20.992Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6373 | 2025-03-01T00:12:20.994Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6374 | 2025-03-01T00:12:20.997Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
6375 | 2025-03-01T00:12:20.997Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6376 | 2025-03-01T00:12:20.997Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6377 | 2025-03-01T00:12:20.997Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6378 | 2025-03-01T00:12:20.999Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6379 | 2025-03-01T00:12:21.003Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6380 | 2025-03-01T00:12:21.003Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6381 | 2025-03-01T00:12:21.003Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6382 | 2025-03-01T00:12:21.004Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6383 | 2025-03-01T00:12:21.005Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6384 | 2025-03-01T00:12:21.009Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
6385 | 2025-03-01T00:12:21.009Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6386 | 2025-03-01T00:12:21.009Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6387 | 2025-03-01T00:12:21.010Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6388 | 2025-03-01T00:12:21.012Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
6389 | 2025-03-01T00:12:21.012Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6390 | 2025-03-01T00:12:21.012Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6391 | 2025-03-01T00:12:21.014Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6392 | 2025-03-01T00:12:21.014Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6393 | 2025-03-01T00:12:21.022Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6394 | 2025-03-01T00:12:21.022Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6395 | 2025-03-01T00:12:21.022Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6396 | 2025-03-01T00:12:21.023Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6397 | 2025-03-01T00:12:21.025Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6398 | 2025-03-01T00:12:21.033Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
6399 | 2025-03-01T00:12:21.033Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6400 | 2025-03-01T00:12:21.033Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6401 | 2025-03-01T00:12:21.033Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6402 | 2025-03-01T00:12:21.035Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6403 | 2025-03-01T00:12:21.042Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6404 | 2025-03-01T00:12:21.043Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6405 | 2025-03-01T00:12:21.049Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6406 | 2025-03-01T00:12:21.055Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6407 | 2025-03-01T00:12:21.055Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6408 | 2025-03-01T00:12:21.056Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6409 | 2025-03-01T00:12:21.058Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6410 | 2025-03-01T00:12:21.058Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6411 | 2025-03-01T00:12:21.058Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6412 | 2025-03-01T00:12:21.058Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6413 | 2025-03-01T00:12:21.058Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6414 | 2025-03-01T00:12:21.079Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6415 | 2025-03-01T00:12:21.079Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6416 | 2025-03-01T00:12:21.080Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6417 | 2025-03-01T00:12:21.081Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6418 | 2025-03-01T00:12:21.085Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6419 | 2025-03-01T00:12:21.085Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6420 | 2025-03-01T00:12:21.085Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6421 | 2025-03-01T00:12:21.089Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6422 | 2025-03-01T00:12:21.090Z | DEBG | test_instance_serial (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6423 | 2025-03-01T00:12:21.091Z | DEBG | test_instance_serial (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
|
6424 | 2025-03-01T00:12:21.091Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
6425 | 2025-03-01T00:12:21.093Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6426 | 2025-03-01T00:12:21.109Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6427 | 2025-03-01T00:12:21.109Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6428 | 2025-03-01T00:12:21.109Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6429 | 2025-03-01T00:12:21.109Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6430 | 2025-03-01T00:12:21.109Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6431 | 2025-03-01T00:12:21.110Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6432 | 2025-03-01T00:12:21.111Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 2
table_name = fields_string
|
6433 | 2025-03-01T00:12:21.111Z | TRAC | test_instance_serial (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
6434 | 2025-03-01T00:12:21.115Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6435 | 2025-03-01T00:12:21.115Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6436 | 2025-03-01T00:12:21.115Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6437 | 2025-03-01T00:12:21.116Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6438 | 2025-03-01T00:12:21.119Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6439 | 2025-03-01T00:12:21.119Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6440 | 2025-03-01T00:12:21.119Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6441 | 2025-03-01T00:12:21.125Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6442 | 2025-03-01T00:12:21.126Z | DEBG | test_instance_serial (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = 46c7197b-e099-494b-a693-296ecb919b0c
n_rows = 1
table_name = measurements_i64
|
6443 | 2025-03-01T00:12:21.126Z | TRAC | test_instance_serial (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
6444 | 2025-03-01T00:12:21.129Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6445 | 2025-03-01T00:12:21.146Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6446 | 2025-03-01T00:12:21.146Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6447 | 2025-03-01T00:12:21.146Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6448 | 2025-03-01T00:12:21.147Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6449 | 2025-03-01T00:12:21.218Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:36473
remote_addr = [::1]:49990
|
6450 | 2025-03-01T00:12:21.218Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:36473
method = GET
remote_addr = [::1]:49990
req_id = bcfbb381-2a05-4e03-80b3-5428dc09c37e
uri = /instance/serial/history?from_start=0
|
6451 | 2025-03-01T00:12:21.219Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 323
local_addr = [::1]:36473
method = GET
remote_addr = [::1]:49990
req_id = bcfbb381-2a05-4e03-80b3-5428dc09c37e
response_code = 200
uri = /instance/serial/history?from_start=0
|
6452 | 2025-03-01T00:12:21.220Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 235125
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355
response_code = 200
uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
|
6453 | 2025-03-01T00:12:21.221Z | INFO | test_instance_serial (external client test context): client received response
status = 200
|
6454 | 2025-03-01T00:12:21.221Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43509/v1/instances/kris-picks/stop?project=springfield-squidport
|
6455 | 2025-03-01T00:12:21.222Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6456 | 2025-03-01T00:12:21.222Z | TRAC | test_instance_serial (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6457 | 2025-03-01T00:12:21.222Z | DEBG | test_instance_serial (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6458 | 2025-03-01T00:12:21.222Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6459 | 2025-03-01T00:12:21.222Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6460 | 2025-03-01T00:12:21.223Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6461 | 2025-03-01T00:12:21.225Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6462 | 2025-03-01T00:12:21.226Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6463 | 2025-03-01T00:12:21.226Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6464 | 2025-03-01T00:12:21.228Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
6465 | 2025-03-01T00:12:21.228Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6466 | 2025-03-01T00:12:21.228Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6467 | 2025-03-01T00:12:21.228Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6468 | 2025-03-01T00:12:21.230Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6469 | 2025-03-01T00:12:21.240Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6470 | 2025-03-01T00:12:21.241Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6471 | 2025-03-01T00:12:21.241Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6472 | 2025-03-01T00:12:21.242Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6473 | 2025-03-01T00:12:21.245Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6474 | 2025-03-01T00:12:21.248Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
6475 | 2025-03-01T00:12:21.248Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6476 | 2025-03-01T00:12:21.249Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6477 | 2025-03-01T00:12:21.249Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6478 | 2025-03-01T00:12:21.251Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
6479 | 2025-03-01T00:12:21.251Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
6480 | 2025-03-01T00:12:21.251Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6481 | 2025-03-01T00:12:21.252Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6482 | 2025-03-01T00:12:21.252Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6483 | 2025-03-01T00:12:21.254Z | TRAC | test_instance_serial (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6484 | 2025-03-01T00:12:21.254Z | TRAC | test_instance_serial (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
|
6485 | 2025-03-01T00:12:21.255Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
6486 | 2025-03-01T00:12:21.256Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Database
result = Ok(())
|
6487 | 2025-03-01T00:12:21.258Z | DEBG | test_instance_serial (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
6488 | 2025-03-01T00:12:21.261Z | DEBG | test_instance_serial (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
6489 | 2025-03-01T00:12:21.261Z | TRAC | test_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6490 | 2025-03-01T00:12:21.261Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6491 | 2025-03-01T00:12:21.261Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6492 | 2025-03-01T00:12:21.262Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6493 | 2025-03-01T00:12:21.265Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6494 | 2025-03-01T00:12:21.265Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6495 | 2025-03-01T00:12:21.266Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6496 | 2025-03-01T00:12:21.268Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6497 | 2025-03-01T00:12:21.269Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6498 | 2025-03-01T00:12:21.270Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6499 | 2025-03-01T00:12:21.292Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6500 | 2025-03-01T00:12:21.293Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6501 | 2025-03-01T00:12:21.293Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6502 | 2025-03-01T00:12:21.293Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6503 | 2025-03-01T00:12:21.294Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6504 | 2025-03-01T00:12:21.297Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6505 | 2025-03-01T00:12:21.297Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6506 | 2025-03-01T00:12:21.298Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6507 | 2025-03-01T00:12:21.298Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6508 | 2025-03-01T00:12:21.304Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6509 | 2025-03-01T00:12:21.304Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6510 | 2025-03-01T00:12:21.304Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6511 | 2025-03-01T00:12:21.305Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6512 | 2025-03-01T00:12:21.309Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6513 | 2025-03-01T00:12:21.330Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6514 | 2025-03-01T00:12:21.330Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6515 | 2025-03-01T00:12:21.331Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6516 | 2025-03-01T00:12:21.331Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6517 | 2025-03-01T00:12:21.331Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6518 | 2025-03-01T00:12:21.332Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6519 | 2025-03-01T00:12:21.341Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6520 | 2025-03-01T00:12:21.341Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6521 | 2025-03-01T00:12:21.342Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6522 | 2025-03-01T00:12:21.354Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6523 | 2025-03-01T00:12:21.359Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6524 | 2025-03-01T00:12:21.359Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6525 | 2025-03-01T00:12:21.360Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6526 | 2025-03-01T00:12:21.362Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6527 | 2025-03-01T00:12:21.366Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6528 | 2025-03-01T00:12:21.399Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6529 | 2025-03-01T00:12:21.402Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6530 | 2025-03-01T00:12:21.402Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6531 | 2025-03-01T00:12:21.402Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6532 | 2025-03-01T00:12:21.403Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
6533 | 2025-03-01T00:12:21.404Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
6534 | 2025-03-01T00:12:21.404Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
6535 | 2025-03-01T00:12:21.410Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
6536 | 2025-03-01T00:12:21.410Z | TRAC | test_instance_serial (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
6537 | 2025-03-01T00:12:21.410Z | TRAC | test_instance_serial (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
|
6538 | 2025-03-01T00:12:21.410Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
6539 | 2025-03-01T00:12:21.411Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Database
result = Ok(())
|
6540 | 2025-03-01T00:12:21.415Z | DEBG | test_instance_serial (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
6541 | 2025-03-01T00:12:21.425Z | DEBG | test_instance_serial (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
6542 | 2025-03-01T00:12:21.510Z | DEBG | test_instance_serial (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
6543 | 2025-03-01T00:12:21.510Z | INFO | test_instance_serial (dropshot): accepted connection
local_addr = [::1]:38105
remote_addr = [::1]:50058
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
6544 | 2025-03-01T00:12:21.511Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50058
req_id = b12bd6a9-49e0-4728-87a2-36df425a5f37
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
6545 | 2025-03-01T00:12:21.512Z | TRAC | test_instance_serial (dropshot): incoming request
local_addr = [::1]:36473
method = PUT
remote_addr = [::1]:49988
req_id = b0c7abb6-9d25-4edd-af76-9d9bffb97238
uri = /instance/state
|
6546 | 2025-03-01T00:12:21.512Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 314
local_addr = [::1]:36473
method = PUT
remote_addr = [::1]:49988
req_id = b0c7abb6-9d25-4edd-af76-9d9bffb97238
response_code = 204
uri = /instance/state
|
6547 | 2025-03-01T00:12:21.512Z | INFO | test_instance_serial (SledAgent): transition
action = None
current = SledVmmState { vmm_state: VmmRuntimeState { state: Stopping, gen: Generation(4), time_updated: 2025-03-01T00:12:21.512424434Z }, migration_in: None, migration_out: None }
desired = Some(Stopped)
dropped = None
id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
kind = instances
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
target = Stopped
|
6548 | 2025-03-01T00:12:21.512Z | INFO | test_instance_serial (dropshot): request completed
latency_us = 1530
local_addr = [::1]:38105
method = PUT
remote_addr = [::1]:50058
req_id = b12bd6a9-49e0-4728-87a2-36df425a5f37
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
|
6549 | 2025-03-01T00:12:21.512Z | DEBG | test_instance_serial (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "b12bd6a9-49e0-4728-87a2-36df425a5f37", "content-length": "151", "date": "Sat, 01 Mar 2025 00:12:20 GMT"} })
|
6550 | 2025-03-01T00:12:21.513Z | INFO | test_instance_serial (dropshot_external): received new VMM runtime state from sled agent
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
migration_state = Migrations { migration_in: None, migration_out: None }
propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
vmm_state = VmmRuntimeState { state: Stopping, gen: Generation(4), time_updated: 2025-03-01T00:12:21.512424434Z }
|
6551 | 2025-03-01T00:12:21.513Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6552 | 2025-03-01T00:12:21.513Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6553 | 2025-03-01T00:12:21.514Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6554 | 2025-03-01T00:12:21.560Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6555 | 2025-03-01T00:12:21.560Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24
resource_type = Project
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6556 | 2025-03-01T00:12:21.560Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6557 | 2025-03-01T00:12:21.561Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6558 | 2025-03-01T00:12:21.562Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6559 | 2025-03-01T00:12:21.566Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6560 | 2025-03-01T00:12:21.566Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6561 | 2025-03-01T00:12:21.566Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6562 | 2025-03-01T00:12:21.566Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6563 | 2025-03-01T00:12:21.569Z | TRAC | test_instance_serial (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6564 | 2025-03-01T00:12:21.569Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6565 | 2025-03-01T00:12:21.570Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6566 | 2025-03-01T00:12:21.570Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6567 | 2025-03-01T00:12:21.576Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6568 | 2025-03-01T00:12:21.582Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") }
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6569 | 2025-03-01T00:12:21.582Z | TRAC | test_instance_serial (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6570 | 2025-03-01T00:12:21.583Z | DEBG | test_instance_serial (dropshot_external): roles
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
roles = RoleSet { roles: {} }
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6571 | 2025-03-01T00:12:21.584Z | DEBG | test_instance_serial (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. })
actor_id = 001de000-05e4-4000-8000-000000004007
authenticated = true
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
resource = Database
result = Ok(())
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6572 | 2025-03-01T00:12:21.587Z | INFO | test_instance_serial (dropshot_external): request completed
latency_us = 365271
local_addr = 127.0.0.1:43509
method = POST
remote_addr = 127.0.0.1:54780
req_id = 876212c9-d07c-4266-aac5-5d550eb806b2
response_code = 202
uri = /v1/instances/kris-picks/stop?project=springfield-squidport
|
6573 | 2025-03-01T00:12:21.593Z | INFO | test_instance_serial (external client test context): client received response
status = 202
|
6574 | 2025-03-01T00:12:21.593Z | INFO | test_instance_serial (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
|
6575 | 2025-03-01T00:12:21.593Z | TRAC | test_instance_serial (dropshot_external): incoming request
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 92992c9b-7e4e-4cf6-9604-3e48681e7272
uri = /v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
|
6576 | 2025-03-01T00:12:21.593Z | INFO | test_instance_serial (dropshot_external): request completed
error_message_external = expected connection upgrade
error_message_internal = expected connection upgrade
latency_us = 296
local_addr = 127.0.0.1:43509
method = GET
remote_addr = 127.0.0.1:54780
req_id = 92992c9b-7e4e-4cf6-9604-3e48681e7272
response_code = 400
uri = /v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
|
6577 | 2025-03-01T00:12:21.593Z | INFO | test_instance_serial (external client test context): client received response
status = 400
|